Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1036017?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1036017?format=api", "purl": "pkg:deb/debian/glibc@2.0.7.19981211-6", "type": "deb", "namespace": "debian", "name": "glibc", "version": "2.0.7.19981211-6", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.36-8", "latest_non_vulnerable_version": "2.42-14", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43777?format=api", "vulnerability_id": "VCID-13gq-1x22-skhy", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1686", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16819", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17028", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16952", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1701", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16985", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16817", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893708", "reference_id": "1893708", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893708" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914", "reference_id": "973914", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210401-0006/", "reference_id": "ntap-20210401-0006", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210401-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21", "reference_id": "show_bug.cgi?id=19519#c21", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224", "reference_id": "show_bug.cgi?id=26224", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-27618" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13gq-1x22-skhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54361?format=api", "vulnerability_id": "VCID-1971-5hzf-43dt", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html" }, { "reference_url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81952", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81972", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81956", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jun/18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jun/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93784", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93784" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jun/14" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17048" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152" }, { "reference_url": "http://www.securityfocus.com/bid/68006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68006" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109263", "reference_id": "1109263", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109263" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774", "reference_id": "751774", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4043", "reference_id": "CVE-2014-4043", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4043" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/2306-1/", "reference_id": "USN-2306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2306-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2014-4043" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61763?format=api", "vulnerability_id": "VCID-22vv-9xn4-vyap", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3404", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.6952", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69575", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69599", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69624", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69633", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473", "reference_id": "681473", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=833703", "reference_id": "833703", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833703" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098", "reference_id": "RHSA-2012:1098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200", "reference_id": "RHSA-2012:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1200" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2012-3404" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vv-9xn4-vyap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62168?format=api", "vulnerability_id": "VCID-2gmq-64e3-c7db", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013", "reference_id": "2042013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768", "reference_id": "show_bug.cgi?id=28768", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2022-23218" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gmq-64e3-c7db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54360?format=api", "vulnerability_id": "VCID-2pd1-hkrf-j7e5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74532", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74506", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74538", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74576", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74587", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74594", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186614", "reference_id": "1186614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1391", "reference_id": "RHSA-2014:1391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1627", "reference_id": "RHSA-2015:1627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1627" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-7424" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pd1-hkrf-j7e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87523?format=api", "vulnerability_id": "VCID-2tet-rxt9-n3ac", "summary": "glibc: scanf implementation crashes on certain inputs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5320.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5320.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5320", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18715", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18814", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.19005", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18728", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18808", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18863", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18763", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5320" }, { "reference_url": "https://marc.info/?l=gimp-developer&m=129567990905823&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://marc.info/?l=gimp-developer&m=129567990905823&w=2" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=20b38e0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=20b38e0" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=3f8cc204fdd0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=3f8cc204fdd0" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/03/12/14", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/03/12/14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196745", "reference_id": "1196745", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196745" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5320", "reference_id": "CVE-2011-5320", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5320" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2011-5320" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2tet-rxt9-n3ac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61185?format=api", "vulnerability_id": "VCID-2tgj-syh1-pqaj", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9761", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03577", "scoring_system": "epss", "scoring_elements": "0.87751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88127", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.8815", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88078", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88133", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88143", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88135", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jun/18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jun/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jun/14" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16962" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/83306", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83306" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300310", "reference_id": "1300310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300310" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187", "reference_id": "813187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9761", "reference_id": "CVE-2014-9761", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9761" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2014-9761" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2tgj-syh1-pqaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=api", "vulnerability_id": "VCID-3hqs-jns2-puf2", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70205", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.7018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70165", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70196", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202", "reference_id": "2277202", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005", "reference_id": "GLIBC-SA-2024-0005", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0011/", "reference_id": "ntap-20240524-0011", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0011/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33599" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88009?format=api", "vulnerability_id": "VCID-3yq4-pzqz-4yap", "summary": "glibc: ldd unexpected code execution issue", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2011/03/07/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/07/10" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/07/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/07/13" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/07/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/07/7" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/1" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/10" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/2" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/7" }, { "reference_url": "http://reverse.lostrealm.com/protect/ldd.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://reverse.lostrealm.com/protect/ldd.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5064.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5064.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5064", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25579", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25679", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2579", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25632", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25678", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25648", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25591", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25594", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5064" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=531160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531160" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=682998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5064" }, { "reference_url": "http://www.catonmat.net/blog/ldd-arbitrary-code-execution/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.catonmat.net/blog/ldd-arbitrary-code-execution/" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=692393", "reference_id": "692393", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692393" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5064", "reference_id": "CVE-2009-5064", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1526", "reference_id": "RHSA-2011:1526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1526" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0126", "reference_id": "RHSA-2012:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0126" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2009-5064" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3yq4-pzqz-4yap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61767?format=api", "vulnerability_id": "VCID-42jj-9jmf-s3h5", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.6964", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69652", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69696", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69713", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.6972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69707", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69747", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69756", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423", "reference_id": "689423", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=858238", "reference_id": "858238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858238" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2012-4424" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42jj-9jmf-s3h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88507?format=api", "vulnerability_id": "VCID-481z-kryb-97d5", "summary": "glibc: strfmon format string problem", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1391.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1391.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1391", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95296", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95313", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95325", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95328", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95335", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95343", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19061", "scoring_system": "epss", "scoring_elements": "0.95346", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1391" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=524671", "reference_id": "524671", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524671" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/31550.c", "reference_id": "CVE-2008-1391;OSVDB-43837", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/31550.c" }, { "reference_url": "https://www.securityfocus.com/bid/28479/info", "reference_id": "CVE-2008-1391;OSVDB-43837", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/28479/info" }, { "reference_url": "https://usn.ubuntu.com/944-1/", "reference_id": "USN-944-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/944-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2008-1391" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-481z-kryb-97d5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84247?format=api", "vulnerability_id": "VCID-4nf7-929x-4bb1", "summary": "glibc: nscd buffer manipulation vulnerability could lead to code execution or crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9984", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65872", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65996", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65948", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65943", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65973", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65978", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463288", "reference_id": "1463288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463288" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2014-9984" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nf7-929x-4bb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54364?format=api", "vulnerability_id": "VCID-5g37-r914-r3g8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.6359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63554", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63606", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63622", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63634", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209105", "reference_id": "1209105", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209105" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197", "reference_id": "777197", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2199", "reference_id": "RHSA-2015:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2519-1/", "reference_id": "USN-2519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2519-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2015-1473" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5g37-r914-r3g8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87956?format=api", "vulnerability_id": "VCID-6fwn-j4p2-ffh9", "summary": "glibc NIS password hash disclosure", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0015.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0015.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0015", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81425", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81426", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01817", "scoring_system": "epss", "scoring_elements": "0.82844", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01817", "scoring_system": "epss", "scoring_elements": "0.82793", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01817", "scoring_system": "epss", "scoring_elements": "0.82866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01817", "scoring_system": "epss", "scoring_elements": "0.8285", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01817", "scoring_system": "epss", "scoring_elements": "0.82809", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01817", "scoring_system": "epss", "scoring_elements": "0.82823", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01817", "scoring_system": "epss", "scoring_elements": "0.82818", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=555573", "reference_id": "555573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555573" }, { "reference_url": "https://usn.ubuntu.com/1396-1/", "reference_id": "USN-1396-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1396-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2010-0015" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6fwn-j4p2-ffh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81840?format=api", "vulnerability_id": "VCID-6kb1-yuq8-tfbs", "summary": "glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06277", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06399", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06327", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06404", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25204" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681", "reference_id": "1774681", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250", "reference_id": "945250", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126", "reference_id": "CVE-2019-19126", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1828", "reference_id": "RHSA-2020:1828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3861", "reference_id": "RHSA-2020:3861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2019-19126" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kb1-yuq8-tfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62165?format=api", "vulnerability_id": "VCID-6qa1-upks-g3dm", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74892", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74808", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74858", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74885", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637", "reference_id": "2024637", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/24/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/01/24/4" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3999", "reference_id": "CVE-2021-3999", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2021-3999" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2021-3999", "reference_id": "CVE-2021-3999", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-3999" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e", "reference_id": "gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221104-0001/", "reference_id": "ntap-20221104-0001", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221104-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769", "reference_id": "show_bug.cgi?id=28769", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050173?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u5" } ], "aliases": [ "CVE-2021-3999" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58069?format=api", "vulnerability_id": "VCID-6t8d-48g7-1yey", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05694", "scoring_system": "epss", "scoring_elements": "0.90423", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92909", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92927", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92897", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92901", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92914", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92918", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92916", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17905" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/82244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/82244" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300312", "reference_id": "1300312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300312" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455", "reference_id": "812455", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8779", "reference_id": "CVE-2015-8779", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8779" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8779" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t8d-48g7-1yey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57208?format=api", "vulnerability_id": "VCID-746m-vcyt-97gh", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing arbitrary code execution and privilege escalation.", "references": [ { "reference_url": "http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/" }, { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5029.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02765", "scoring_system": "epss", "scoring_elements": "0.8605", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02765", "scoring_system": "epss", "scoring_elements": "0.86032", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02765", "scoring_system": "epss", "scoring_elements": "0.86027", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02765", "scoring_system": "epss", "scoring_elements": "0.86045", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89837", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89799", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.8985", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89844", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.89816", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05109", "scoring_system": "epss", "scoring_elements": "0.8982", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2" }, { "reference_url": "http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=761245", "reference_id": "761245", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761245" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5029", "reference_id": "CVE-2009-5029", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5029" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36404.c", "reference_id": "CVE-2009-5029;OSVDB-77508", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36404.c" }, { "reference_url": "https://www.securityfocus.com/bid/50898/info", "reference_id": "CVE-2009-5029;OSVDB-77508", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/50898/info" }, { "reference_url": "https://security.gentoo.org/glsa/201312-01", "reference_id": "GLSA-201312-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0058", "reference_id": "RHSA-2012:0058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0126", "reference_id": "RHSA-2012:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0126" }, { "reference_url": "https://usn.ubuntu.com/1396-1/", "reference_id": "USN-1396-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1396-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2009-5029" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-746m-vcyt-97gh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61415?format=api", "vulnerability_id": "VCID-75dc-1fd5-u3e2", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9169", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0708", "scoring_system": "epss", "scoring_elements": "0.91536", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0708", "scoring_system": "epss", "scoring_elements": "0.91541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94238", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.9425", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94268", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9" }, { "reference_url": "https://support.f5.com/csp/article/K54823184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K54823184" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "http://www.securityfocus.com/bid/107160", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107160" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684057", "reference_id": "1684057", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684057" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612", "reference_id": "924612", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612" }, { "reference_url": "https://security.archlinux.org/ASA-201911-3", "reference_id": "ASA-201911-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-3" }, { "reference_url": "https://security.archlinux.org/AVG-855", "reference_id": "AVG-855", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-855" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9169", "reference_id": "CVE-2019-9169", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9169" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049937?format=api", "purl": "pkg:deb/debian/glibc@2.28-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-10" } ], "aliases": [ "CVE-2019-9169" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75dc-1fd5-u3e2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88538?format=api", "vulnerability_id": "VCID-7be7-f2ha-r7h6", "summary": "libbind off-by-one buffer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00923", "scoring_system": "epss", "scoring_elements": "0.75931", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00923", "scoring_system": "epss", "scoring_elements": "0.75934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00923", "scoring_system": "epss", "scoring_elements": "0.75967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00923", "scoring_system": "epss", "scoring_elements": "0.75946", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00923", "scoring_system": "epss", "scoring_elements": "0.75979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00923", "scoring_system": "epss", "scoring_elements": "0.75993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00923", "scoring_system": "epss", "scoring_elements": "0.76018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82283", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82277", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=429149", "reference_id": "429149", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0300", "reference_id": "RHSA-2008:0300", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0300" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036019?format=api", "purl": "pkg:deb/debian/glibc@2.2.5-11.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-ag2y-afz2-33gu" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-atmj-ekuz-zyg8" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mrha-gp2j-vkf7" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-r6kw-vaat-mbav" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-vvkk-5k95-fqfk" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-11.8" } ], "aliases": [ "CVE-2008-0122" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7be7-f2ha-r7h6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59553?format=api", "vulnerability_id": "VCID-7czm-1nzx-nfbn", "summary": "Multiple vulnerabilities have been found in the GNU C library, the\n worst allowing for remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7423.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89322", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89331", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89325", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89338", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187109", "reference_id": "1187109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187109" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722075", "reference_id": "722075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722075" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0863", "reference_id": "RHSA-2015:0863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2199", "reference_id": "RHSA-2015:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1207", "reference_id": "RHSA-2016:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1207" }, { "reference_url": "https://usn.ubuntu.com/2519-1/", "reference_id": "USN-2519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2519-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-7423" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7czm-1nzx-nfbn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59747?format=api", "vulnerability_id": "VCID-7d3q-a8t2-s3d8", "summary": "An integer overflow in the dynamic loader, ld.so, could result in the\n execution of arbitrary code with escalated privileges.", "references": [ { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=183844", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=183844" }, { "reference_url": "http://osvdb.org/37901", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/37901" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3508.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15656", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15772", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15842", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15908", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15707", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15852", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15832", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15795", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15647", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508" }, { "reference_url": "http://secunia.com/advisories/25864", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25864" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200707-04.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200707-04.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35240" }, { "reference_url": "http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup" }, { "reference_url": "http://www.securityfocus.com/bid/24758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24758" }, { "reference_url": "http://www.securitytracker.com/id?1018334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1018334" }, { "reference_url": "http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=247208", "reference_id": "247208", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247208" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431858", "reference_id": "431858", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431858" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3508", "reference_id": "CVE-2007-3508", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3508" }, { "reference_url": "https://security.gentoo.org/glsa/200707-04", "reference_id": "GLSA-200707-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200707-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036023?format=api", "purl": "pkg:deb/debian/glibc@2.7-18lenny7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-18lenny7" } ], "aliases": [ "CVE-2007-3508" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7d3q-a8t2-s3d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61187?format=api", "vulnerability_id": "VCID-7fvy-59bc-jqf6", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1234", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79408", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79484", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79456", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79425", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79461", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79483", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1234" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2021/Sep/0" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19779" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/07/16", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/03/07/16" }, { "reference_url": "http://www.securityfocus.com/bid/84204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84204" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315647", "reference_id": "1315647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315647" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1234", "reference_id": "CVE-2016-1234", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1234" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-1234" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fvy-59bc-jqf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87561?format=api", "vulnerability_id": "VCID-7xzr-rdk3-cfhg", "summary": "glibc: De-recursivise regular expression engine", "references": [ { "reference_url": "http://cxib.net/stuff/proftpd.gnu.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cxib.net/stuff/proftpd.gnu.c" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4051.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4051.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4051", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89268", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89274", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89308", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89322", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89319", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89316", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04658", "scoring_system": "epss", "scoring_elements": "0.89329", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4051" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4051", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4051" }, { "reference_url": "http://seclists.org/fulldisclosure/2011/Jan/78", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2011/Jan/78" }, { "reference_url": "http://secunia.com/advisories/42547", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42547" }, { "reference_url": "http://securityreason.com/achievement_securityalert/93", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/achievement_securityalert/93" }, { "reference_url": "http://securitytracker.com/id?1024832", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024832" }, { "reference_url": "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E" }, { "reference_url": "http://www.exploit-db.com/exploits/15935", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/15935" }, { "reference_url": "http://www.kb.cert.org/vuls/id/912279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/912279" }, { "reference_url": "http://www.securityfocus.com/archive/1/515589/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/515589/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/45233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45233" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=645859", "reference_id": "645859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645859" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4051", "reference_id": "CVE-2010-4051", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4051" }, { "reference_url": "http://securityreason.com/securityalert/8003", "reference_id": "CVE-2010-4051;CVE-2010-4052", "reference_type": "exploit", "scores": [], "url": "http://securityreason.com/securityalert/8003" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15935.c", "reference_id": "CVE-2010-4051;CVE-2010-4052", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15935.c" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2010-4051" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xzr-rdk3-cfhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85197?format=api", "vulnerability_id": "VCID-814q-u5m5-gqec", "summary": "glibc: stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458)", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85307", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85213", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85225", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85246", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85291", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85288", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://source.android.com/security/bulletin/2017-12-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-12-01" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20010" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039" }, { "reference_url": "http://www.securityfocus.com/bid/102073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102073" }, { "reference_url": "http://www.securityfocus.com/bid/88440", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/88440" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330887", "reference_id": "1330887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330887" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3706", "reference_id": "CVE-2016-3706", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3706" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-3706" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-814q-u5m5-gqec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85132?format=api", "vulnerability_id": "VCID-84zb-rzwk-fbfp", "summary": "glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.8358", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83682", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83646", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83681", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83633", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83641", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83658", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html" }, { "reference_url": "https://source.android.com/security/bulletin/2017-12-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-12-01" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20112" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039" }, { "reference_url": "http://www.securityfocus.com/bid/102073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102073" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337136", "reference_id": "1337136", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337136" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347", "reference_id": "840347", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4429", "reference_id": "CVE-2016-4429", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4429" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" }, { "reference_url": "https://usn.ubuntu.com/3759-1/", "reference_id": "USN-3759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3759-1/" }, { "reference_url": "https://usn.ubuntu.com/3759-2/", "reference_id": "USN-3759-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3759-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-4429" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-84zb-rzwk-fbfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83798?format=api", "vulnerability_id": "VCID-8egr-f63v-3uht", "summary": "glibc: Buffer overflow triggerable via LD_LIBRARY_PATH", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000409", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00841", "scoring_system": "epss", "scoring_elements": "0.74681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.7541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75419", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75406", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75447", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75454", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000409" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522830", "reference_id": "1522830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522830" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133", "reference_id": "884133", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000409" ], "risk_score": 8.4, "exploitability": "2.0", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8egr-f63v-3uht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43780?format=api", "vulnerability_id": "VCID-8p27-z2tz-4bbm", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30847", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30852", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30873", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30973", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30927", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30887", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408", "reference_id": "1965408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147", "reference_id": "989147", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2021-33574" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58062?format=api", "vulnerability_id": "VCID-991k-es3s-hbg4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86497", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86516", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86515", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86545", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.8656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86564", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86569", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165192", "reference_id": "1165192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165192" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587", "reference_id": "779587", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0327", "reference_id": "RHSA-2015:0327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0327" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2014-8121" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-991k-es3s-hbg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42262?format=api", "vulnerability_id": "VCID-9tjq-wrg8-7bfw", "summary": "PHP contains several vulnerabilities including buffer and integer overflows\n which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81649", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81654", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81661", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81693", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01592", "scoring_system": "epss", "scoring_elements": "0.81692", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840" }, { "reference_url": "https://security.gentoo.org/glsa/200710-02", "reference_id": "GLSA-200710-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036023?format=api", "purl": "pkg:deb/debian/glibc@2.7-18lenny7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-18lenny7" } ], "aliases": [ "CVE-2007-4840" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tjq-wrg8-7bfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88516?format=api", "vulnerability_id": "VCID-9wwp-9dpd-s7he", "summary": "Kernel doesn't clear DF for signal handlers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03849", "scoring_system": "epss", "scoring_elements": "0.88136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03849", "scoring_system": "epss", "scoring_elements": "0.88145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03849", "scoring_system": "epss", "scoring_elements": "0.88161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03849", "scoring_system": "epss", "scoring_elements": "0.88167", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03849", "scoring_system": "epss", "scoring_elements": "0.88186", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03849", "scoring_system": "epss", "scoring_elements": "0.88192", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03849", "scoring_system": "epss", "scoring_elements": "0.88202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04362", "scoring_system": "epss", "scoring_elements": "0.8896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04362", "scoring_system": "epss", "scoring_elements": "0.88959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04362", "scoring_system": "epss", "scoring_elements": "0.88971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04362", "scoring_system": "epss", "scoring_elements": "0.8897", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=437312", "reference_id": "437312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437312" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583", "reference_id": "465583", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0211", "reference_id": "RHSA-2008:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0233", "reference_id": "RHSA-2008:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0508", "reference_id": "RHSA-2008:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0508" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036023?format=api", "purl": "pkg:deb/debian/glibc@2.7-18lenny7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-18lenny7" } ], "aliases": [ "CVE-2008-1367" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wwp-9dpd-s7he" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54362?format=api", "vulnerability_id": "VCID-aapy-xr76-zbc4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92444", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92459", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92485", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92486", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92496", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175369", "reference_id": "1175369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175369" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572", "reference_id": "775572", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/2519-1/", "reference_id": "USN-2519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2519-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2014-9402" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aapy-xr76-zbc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89716?format=api", "vulnerability_id": "VCID-ag2y-afz2-33gu", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0028", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98096", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98097", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98102", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98103", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98109", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.56051", "scoring_system": "epss", "scoring_elements": "0.98111", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616941", "reference_id": "1616941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:051", "reference_id": "RHSA-2003:051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:052", "reference_id": "RHSA-2003:052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:089", "reference_id": "RHSA-2003:089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:089" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:090", "reference_id": "RHSA-2003:090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:090" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:091", "reference_id": "RHSA-2003:091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:168", "reference_id": "RHSA-2003:168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:212", "reference_id": "RHSA-2003:212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:212" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036020?format=api", "purl": "pkg:deb/debian/glibc@2.3.2.ds1-22sarge6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-22sarge6" } ], "aliases": [ "CVE-2003-0028" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ag2y-afz2-33gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54363?format=api", "vulnerability_id": "VCID-aq6k-yr6s-4ygw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89413", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89424", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89442", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89445", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89463", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188235", "reference_id": "1188235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188235" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197", "reference_id": "777197", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2199", "reference_id": "RHSA-2015:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2519-1/", "reference_id": "USN-2519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2519-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2015-1472" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aq6k-yr6s-4ygw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89833?format=api", "vulnerability_id": "VCID-atmj-ekuz-zyg8", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92909", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92917", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92921", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.9292", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92928", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92933", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92938", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92936", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92937", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92947", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09717", "scoring_system": "epss", "scoring_elements": "0.92949", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616843", "reference_id": "1616843", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:197", "reference_id": "RHSA-2002:197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:022", "reference_id": "RHSA-2003:022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:212", "reference_id": "RHSA-2003:212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:212" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036020?format=api", "purl": "pkg:deb/debian/glibc@2.3.2.ds1-22sarge6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-22sarge6" } ], "aliases": [ "CVE-2002-1146" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-atmj-ekuz-zyg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59737?format=api", "vulnerability_id": "VCID-b6tp-a1qc-pfdw", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6096", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8318", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8321", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83208", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8324", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83282", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6096" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25620", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" }, { "reference_url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820331", "reference_id": "1820331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820331" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452", "reference_id": "961452", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6096", "reference_id": "CVE-2020-6096", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://usn.ubuntu.com/4954-1/", "reference_id": "USN-4954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4954-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-6096" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b6tp-a1qc-pfdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=api", "vulnerability_id": "VCID-bcuy-bbxf-x7hy", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45229", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45231", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45282", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204", "reference_id": "2277204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006", "reference_id": "GLIBC-SA-2024-0006", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0013/", "reference_id": "ntap-20240524-0013", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33600" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40282?format=api", "vulnerability_id": "VCID-bfkj-w1s6-67bc", "summary": "glibc contains an information leak vulnerability allowing the debugging of\n SUID binaries.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1453.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1453.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1453", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2313", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23305", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23348", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23137", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23283", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23245", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23187", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23204", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23197", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617412", "reference_id": "1617412", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617412" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272210", "reference_id": "272210", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272210" }, { "reference_url": "https://security.gentoo.org/glsa/200408-16", "reference_id": "GLSA-200408-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200408-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:256", "reference_id": "RHSA-2005:256", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:256" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:261", "reference_id": "RHSA-2005:261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:261" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036021?format=api", "purl": "pkg:deb/debian/glibc@2.3.6.ds1-13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.6.ds1-13" } ], "aliases": [ "CVE-2004-1453" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bfkj-w1s6-67bc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=api", "vulnerability_id": "VCID-bsue-bznw-1ffe", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28379", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28523", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28476", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28387", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28401", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205", "reference_id": "2277205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007", "reference_id": "GLIBC-SA-2024-0007", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0014/", "reference_id": "ntap-20240524-0014", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0014/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33601" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61766?format=api", "vulnerability_id": "VCID-byqx-z785-6qcq", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95255", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95262", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.9527", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95272", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95277", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95289", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95293", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530", "reference_id": "687530", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=855385", "reference_id": "855385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855385" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c", "reference_id": "CVE-2012-4412;OSVDB-98142", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c" }, { "reference_url": "https://www.securityfocus.com/bid/55462/info", "reference_id": "CVE-2012-4412;OSVDB-98142", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/55462/info" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2012-4412" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byqx-z785-6qcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48726?format=api", "vulnerability_id": "VCID-c2yx-a4d3-q7d8", "summary": "Multiple vulnerabilities were found in glibc, the worst of which allowing\n local attackers to execute arbitrary code as root.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4880.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4880.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4880", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.94092", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.9403", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.9404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.94051", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.94054", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.94062", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.94066", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.94071", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12962", "scoring_system": "epss", "scoring_elements": "0.94087", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880" }, { "reference_url": "http://secunia.com/advisories/39900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39900" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201011-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201011-01.xml" }, { "reference_url": "http://securityreason.com/achievement_securityalert/67", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/achievement_securityalert/67" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59242" }, { "reference_url": "http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=199eb0de8d673fb23aa127721054b4f1803d61f3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=199eb0de8d673fb23aa127721054b4f1803d61f3" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2058" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112" }, { "reference_url": "http://www.securityfocus.com/bid/36443", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/36443" }, { "reference_url": "http://www.ubuntu.com/usn/USN-944-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-944-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1246" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=599070", "reference_id": "599070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4880", "reference_id": "CVE-2009-4880", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4880" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33230.txt", "reference_id": "CVE-2009-4880;OSVDB-65080", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33230.txt" }, { "reference_url": "https://www.securityfocus.com/bid/36443/info", "reference_id": "CVE-2009-4880;OSVDB-65080", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/36443/info" }, { "reference_url": "https://security.gentoo.org/glsa/201011-01", "reference_id": "GLSA-201011-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201011-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2009-4880" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c2yx-a4d3-q7d8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61414?format=api", "vulnerability_id": "VCID-c4w6-89qu-xkev", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-7309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.3775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44351", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44303", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-7309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24155" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html" }, { "reference_url": "http://www.securityfocus.com/bid/106835", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106835" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672232", "reference_id": "1672232", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672232" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7309", "reference_id": "CVE-2019-7309", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7309" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2019-7309" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4w6-89qu-xkev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48731?format=api", "vulnerability_id": "VCID-cktt-pktd-ffat", "summary": "Multiple vulnerabilities were found in glibc, the worst of which allowing\n local attackers to execute arbitrary code as root.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3847.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3847.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3847", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04983", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.93491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.93499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.93506", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.93509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.93515", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.93514", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.93534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11264", "scoring_system": "epss", "scoring_elements": "0.9354", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847" }, { "reference_url": "http://seclists.org/fulldisclosure/2010/Oct/257", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2010/Oct/257" }, { "reference_url": "http://seclists.org/fulldisclosure/2010/Oct/292", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2010/Oct/292" }, { "reference_url": "http://seclists.org/fulldisclosure/2010/Oct/294", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2010/Oct/294" }, { "reference_url": "http://secunia.com/advisories/42787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42787" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201011-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201011-01.xml" }, { "reference_url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" }, { "reference_url": "http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0787.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0787.html" }, { "reference_url": "http://support.avaya.com/css/P8/documents/100120941", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/css/P8/documents/100120941" }, { "reference_url": "https://www.exploit-db.com/exploits/44024/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44024/" }, { "reference_url": "https://www.exploit-db.com/exploits/44025/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44025/" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2122", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2122" }, { "reference_url": "http://www.kb.cert.org/vuls/id/537223", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/537223" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:207", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:207" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0872.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0872.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/44154", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44154" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1009-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1009-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0025", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0025" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=643306", "reference_id": "643306", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643306" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44024.rb", "reference_id": "CVE-2010-3847", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44024.rb" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3847", "reference_id": "CVE-2010-3847", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3847" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/add7ae8fa18f689ff7e41057bc5bd51fdc8eaa5e/modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb", "reference_id": "CVE-2010-3847", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/add7ae8fa18f689ff7e41057bc5bd51fdc8eaa5e/modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44025.rb", "reference_id": "CVE-2010-3856;CVE-2010-3847", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44025.rb" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/cb1b59545b1378be9e781787b028fee03d734f58/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb", "reference_id": "CVE-2010-3856;CVE-2010-3847", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/cb1b59545b1378be9e781787b028fee03d734f58/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb" }, { "reference_url": "http://marc.info/?l=full-disclosure&m=128776663124692&w=2", "reference_id": "CVE-2010-3856;OSVDB-68920;CVE-2010-3847", "reference_type": "exploit", "scores": [], "url": "http://marc.info/?l=full-disclosure&m=128776663124692&w=2" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15304.txt", "reference_id": "CVE-2010-3856;OSVDB-68920;CVE-2010-3847", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15304.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15274.txt", "reference_id": "CVE-2011-0536;OSVDB-68721;CVE-2010-3847", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15274.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201011-01", "reference_id": "GLSA-201011-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201011-01" }, { "reference_url": "https://security.gentoo.org/glsa/201312-01", "reference_id": "GLSA-201312-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0787", "reference_id": "RHSA-2010:0787", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0872", "reference_id": "RHSA-2010:0872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0872" }, { "reference_url": "https://usn.ubuntu.com/1009-1/", "reference_id": "USN-1009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1009-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2010-3847" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cktt-pktd-ffat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31487?format=api", "vulnerability_id": "VCID-cv87-rxmr-cqhn", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45952", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45908", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45928", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60839", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.6081", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22325" }, { "reference_url": "http://www.securityfocus.com/bid/101517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101517" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504806", "reference_id": "1504806", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500", "reference_id": "879500", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500" }, { "reference_url": "https://security.archlinux.org/ASA-201801-8", "reference_id": "ASA-201801-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-8" }, { "reference_url": "https://security.archlinux.org/ASA-201801-9", "reference_id": "ASA-201801-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-9" }, { "reference_url": "https://security.archlinux.org/AVG-460", "reference_id": "AVG-460", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671", "reference_id": "CVE-2017-15671", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15671" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cv87-rxmr-cqhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58067?format=api", "vulnerability_id": "VCID-d1zs-8tg7-byhe", "summary": "security update", "references": [ { "reference_url": "http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18743", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18654", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18745", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18695", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18733", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21072", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18928" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/81469", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81469" }, { "reference_url": "http://www.securitytracker.com/id/1034811", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034811" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260581", "reference_id": "1260581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260581" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316", "reference_id": "798316", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8777", "reference_id": "CVE-2015-8777", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8777" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8777" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d1zs-8tg7-byhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43044?format=api", "vulnerability_id": "VCID-d5xx-af6p-2fhn", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13181", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13129", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13198", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468", "reference_id": "2367468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468" }, { "reference_url": "https://security.gentoo.org/glsa/202509-04", "reference_id": "GLSA-202509-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-04" }, { "reference_url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e", "reference_id": "?id=1e18586c5820e329f741d5c710275e165581380e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/" } ], "url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10219", "reference_id": "RHSA-2025:10219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10220", "reference_id": "RHSA-2025:10220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10294", "reference_id": "RHSA-2025:10294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11487", "reference_id": "RHSA-2025:11487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8655", "reference_id": "RHSA-2025:8655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8686", "reference_id": "RHSA-2025:8686", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8686" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9028", "reference_id": "RHSA-2025:9028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9336", "reference_id": "RHSA-2025:9336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9725", "reference_id": "RHSA-2025:9725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9750", "reference_id": "RHSA-2025:9750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9750" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976", "reference_id": "show_bug.cgi?id=32976", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976" }, { "reference_url": "https://usn.ubuntu.com/7541-1/", "reference_id": "USN-7541-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7541-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api", "purl": "pkg:deb/debian/glibc@2.36-8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8" } ], "aliases": [ "CVE-2025-4802" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43779?format=api", "vulnerability_id": "VCID-dqgn-fdxt-u3cc", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38548", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38494", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38527", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38554", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916", "reference_id": "1921916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/01/28/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2021/01/28/2" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198", "reference_id": "981198", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210304-0007/", "reference_id": "ntap-20210304-0007", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210304-0007/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256", "reference_id": "show_bug.cgi?id=27256", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5699-1/", "reference_id": "USN-5699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5699-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api", "purl": "pkg:deb/debian/glibc@2.31-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11" } ], "aliases": [ "CVE-2021-3326" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqgn-fdxt-u3cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83686?format=api", "vulnerability_id": "VCID-e27x-ufvw-cyec", "summary": "glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11236", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76603", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76537", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.7652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76589", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11236" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.securityfocus.com/bid/104255", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104255" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581269", "reference_id": "1581269", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581269" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071", "reference_id": "899071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11236", "reference_id": "CVE-2018-11236", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-11236" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e27x-ufvw-cyec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89711?format=api", "vulnerability_id": "VCID-e6xr-13c6-7uf9", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0689.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0689.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0689", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75473", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75476", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75487", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75529", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75538", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75559", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75571", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75577", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617066", "reference_id": "1617066", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:249", "reference_id": "RHSA-2003:249", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:249" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:325", "reference_id": "RHSA-2003:325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:325" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036019?format=api", "purl": "pkg:deb/debian/glibc@2.2.5-11.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-ag2y-afz2-33gu" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-atmj-ekuz-zyg8" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mrha-gp2j-vkf7" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-r6kw-vaat-mbav" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-vvkk-5k95-fqfk" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-11.8" } ], "aliases": [ "CVE-2003-0689" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6xr-13c6-7uf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54412?format=api", "vulnerability_id": "VCID-e9fg-s2r5-qfc2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.79004", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.7893", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78964", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78978", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.79002", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78976", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14134" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3142" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/29/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/08/29/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/02/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/09/02/1" }, { "reference_url": "http://www.securityfocus.com/bid/69472", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69472" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2432-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2432-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135840", "reference_id": "1135840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135840" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6656", "reference_id": "CVE-2012-6656", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/2432-1/", "reference_id": "USN-2432-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2432-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2012-6656" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39605?format=api", "vulnerability_id": "VCID-edpa-k13r-uken", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.7833", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78313", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78375", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383297", "reference_id": "1383297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383297" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752", "reference_id": "834752", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036928?format=api", "purl": "pkg:deb/debian/glibc@2.24-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-10" } ], "aliases": [ "CVE-2016-6323" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edpa-k13r-uken" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82700?format=api", "vulnerability_id": "VCID-evbv-ckb4-yybq", "summary": "glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80034", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80112", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80091", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80083", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80062", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80079", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80107", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=11053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672" }, { "reference_url": "https://support.f5.com/csp/article/K64119434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K64119434" }, { "reference_url": "https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683683", "reference_id": "1683683", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683683" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613", "reference_id": "924613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5155", "reference_id": "CVE-2009-5155", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5155" }, { "reference_url": "https://usn.ubuntu.com/4954-1/", "reference_id": "USN-4954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4954-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2009-5155" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evbv-ckb4-yybq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48732?format=api", "vulnerability_id": "VCID-f7mh-4xkf-7fha", "summary": "Multiple vulnerabilities were found in glibc, the worst of which allowing\n local attackers to execute arbitrary code as root.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html" }, { "reference_url": "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3856.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05279", "scoring_system": "epss", "scoring_elements": "0.89962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.9256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.92567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.92569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.9258", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.92585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.92591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.9259", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.92604", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0894", "scoring_system": "epss", "scoring_elements": "0.92603", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856" }, { "reference_url": "http://seclists.org/fulldisclosure/2010/Oct/344", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2010/Oct/344" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jun/18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jun/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/31", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2023/Jul/31" }, { "reference_url": "http://secunia.com/advisories/42787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42787" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201011-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201011-01.xml" }, { "reference_url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" }, { "reference_url": "http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0793.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0793.html" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jun/14" }, { "reference_url": "http://support.avaya.com/css/P8/documents/100121017", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/css/P8/documents/100121017" }, { "reference_url": "https://www.exploit-db.com/exploits/44025/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44025/" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2122", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2122" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:212", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:212" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2023/07/19/9" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2023/07/20/1" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0872.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0872.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/44347", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44347" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1009-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1009-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0025", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0025" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=645672", "reference_id": "645672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645672" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3856", "reference_id": "CVE-2010-3856", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3856" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18105.sh", "reference_id": "CVE-2010-3856;OSVDB-68920", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18105.sh" }, { "reference_url": "https://security.gentoo.org/glsa/201011-01", "reference_id": "GLSA-201011-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201011-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0793", "reference_id": "RHSA-2010:0793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0872", "reference_id": "RHSA-2010:0872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0872" }, { "reference_url": "https://usn.ubuntu.com/1009-1/", "reference_id": "USN-1009-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1009-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2010-3856" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f7mh-4xkf-7fha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61188?format=api", "vulnerability_id": "VCID-f7vd-cpza-xfcx", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2573.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2573.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93382", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93378", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19879" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4" }, { "reference_url": "http://www.securityfocus.com/bid/85732", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/85732" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321866", "reference_id": "1321866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321866" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3075", "reference_id": "CVE-2016-3075", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3075" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2573", "reference_id": "RHSA-2016:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2573" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-3075" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f7vd-cpza-xfcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83797?format=api", "vulnerability_id": "VCID-f9ts-xn57-6qa8", "summary": "glibc: Memory leak reachable via LD_HWCAP_MASK", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73386", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73409", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73418", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.7347", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73478", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522828", "reference_id": "1522828", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522828" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132", "reference_id": "884132", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt", "reference_id": "CVE-2017-1000409;CVE-2017-1000408", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000408" ], "risk_score": 6.0, "exploitability": "2.0", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ts-xn57-6qa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85784?format=api", "vulnerability_id": "VCID-fjrd-sadn-kfcf", "summary": "glibc: potential denial of service in internal_fnmatch()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8984", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73305", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73297", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73203", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73234", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73207", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73281", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73254", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18032" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/02/26/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/02/26/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/72789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197730", "reference_id": "1197730", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197730" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587", "reference_id": "779587", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8984", "reference_id": "CVE-2015-8984", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8984" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8984" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjrd-sadn-kfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57213?format=api", "vulnerability_id": "VCID-gbqk-t5bg-dyby", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing arbitrary code execution and privilege escalation.", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/10" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/11" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/12" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/04/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/04/9" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/05/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/05/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/05/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/05/7" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/07/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/07/9" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/14/16", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/14/16" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/14/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/14/5" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/14/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/14/7" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/15/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/15/6" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/22/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/22/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/22/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/22/6" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/31/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/31/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/31/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/31/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/01/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/01/2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1089.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1089.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1089", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25018", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25172", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25213", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24984", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25097", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25071", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25026", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12625" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-1526.html" }, { "reference_url": "http://www.securityfocus.com/bid/46740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46740" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980", "reference_id": "688980", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1089", "reference_id": "CVE-2011-1089", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1089" }, { "reference_url": "https://security.gentoo.org/glsa/201312-01", "reference_id": "GLSA-201312-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1526", "reference_id": "RHSA-2011:1526", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1526" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0126", "reference_id": "RHSA-2012:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0126" }, { "reference_url": "https://usn.ubuntu.com/1396-1/", "reference_id": "USN-1396-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1396-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2011-1089" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbqk-t5bg-dyby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62166?format=api", "vulnerability_id": "VCID-ge24-a7a4-d3bn", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78075", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78154", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78123", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.8172", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81682", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975", "reference_id": "1977975", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542", "reference_id": "990542", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210827-0005/", "reference_id": "ntap-20210827-0005", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210827-0005/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" }, { "reference_url": "https://sourceware.org/glibc/wiki/Security%20Exceptions", "reference_id": "Security%20Exceptions", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/glibc/wiki/Security%20Exceptions" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011", "reference_id": "show_bug.cgi?id=28011", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5699-1/", "reference_id": "USN-5699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5699-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050170?format=api", "purl": "pkg:deb/debian/glibc@2.31-13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13" } ], "aliases": [ "CVE-2021-35942" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34316?format=api", "vulnerability_id": "VCID-gv4u-g36a-w3cf", "summary": "Multiple vulnerabilities in glibc could result in Local Privilege Escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.59128", "scoring_system": "epss", "scoring_elements": "0.9822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.59128", "scoring_system": "epss", "scoring_elements": "0.98223", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.72535", "scoring_system": "epss", "scoring_elements": "0.98763", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.72771", "scoring_system": "epss", "scoring_elements": "0.98771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.9884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98837", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98844", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352", "reference_id": "2238352", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8" }, { "reference_url": "https://www.qualys.com/cve-2023-4911/", "reference_id": "cve-2023-4911", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://www.qualys.com/cve-2023-4911/" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4911", "reference_id": "CVE-2023-4911", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-4911" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt", "reference_id": "CVE-2023-4911", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt" }, { "reference_url": "https://security.gentoo.org/glsa/202310-03", "reference_id": "GLSA-202310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202310-03" }, { "reference_url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "reference_id": "looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5453", "reference_id": "RHSA-2023:5453", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5454", "reference_id": "RHSA-2023:5454", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5455", "reference_id": "RHSA-2023:5455", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5476", "reference_id": "RHSA-2023:5476", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0033", "reference_id": "RHSA-2024:0033", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0033" }, { "reference_url": "https://usn.ubuntu.com/6409-1/", "reference_id": "USN-6409-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6409-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2023-4911" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31488?format=api", "vulnerability_id": "VCID-hdz6-ewkg-xqc9", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43014", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43104", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43077", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43137", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43072", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.431", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43092", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22332" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8" }, { "reference_url": "http://www.securityfocus.com/bid/101535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505298", "reference_id": "1505298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505298" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955", "reference_id": "879955", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804", "reference_id": "CVE-2017-15804", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1879", "reference_id": "RHSA-2018:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1879" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15804" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz6-ewkg-xqc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89895?format=api", "vulnerability_id": "VCID-hh17-b5wu-myav", "summary": "security flaw", "references": [ { "reference_url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102581482511612&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=102581482511612&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2002-139.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2002-139.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0684.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0684.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0684", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87874", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87816", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87827", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87831", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.8787", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03647", "scoring_system": "epss", "scoring_elements": "0.87876", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0684" }, { "reference_url": "http://www.kb.cert.org/vuls/id/542971", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/542971" }, { "reference_url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616795", "reference_id": "1616795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616795" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0684", "reference_id": "CVE-2002-0684", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:139", "reference_id": "RHSA-2002:139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:167", "reference_id": "RHSA-2002:167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:212", "reference_id": "RHSA-2003:212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:212" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036019?format=api", "purl": "pkg:deb/debian/glibc@2.2.5-11.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-ag2y-afz2-33gu" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-atmj-ekuz-zyg8" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mrha-gp2j-vkf7" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-r6kw-vaat-mbav" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-vvkk-5k95-fqfk" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-11.8" } ], "aliases": [ "CVE-2002-0684" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hh17-b5wu-myav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59735?format=api", "vulnerability_id": "VCID-hj77-4nfx-fuaa", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16149", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16169", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16319", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16301", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16131", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905217", "reference_id": "1905217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905217" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391", "reference_id": "976391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210122-0004/", "reference_id": "ntap-20210122-0004", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210122-0004/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26923", "reference_id": "show_bug.cgi?id=26923", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26923" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/", "reference_id": "TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-29562" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hj77-4nfx-fuaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54359?format=api", "vulnerability_id": "VCID-hkyd-8rrg-v3e7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75142", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75188", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75219", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888", "reference_id": "681888", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943", "reference_id": "826943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1097", "reference_id": "RHSA-2012:1097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098", "reference_id": "RHSA-2012:1098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200", "reference_id": "RHSA-2012:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1200" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2012-3406" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59736?format=api", "vulnerability_id": "VCID-hrky-wxm3-5fh3", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36892", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36979", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37061", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37094", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36922", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36973", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36995", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.3696", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905213", "reference_id": "1905213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905213" }, { "reference_url": "https://security.archlinux.org/AVG-1324", "reference_id": "AVG-1324", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1324" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2813", "reference_id": "RHSA-2021:2813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2998", "reference_id": "RHSA-2021:2998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3315", "reference_id": "RHSA-2021:3315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3315" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2020-29573" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrky-wxm3-5fh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57212?format=api", "vulnerability_id": "VCID-hu2t-wcga-c3e9", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing arbitrary code execution and privilege escalation.", "references": [ { "reference_url": "http://bugs.debian.org/615120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/615120" }, { "reference_url": "http://code.google.com/p/chromium/issues/detail?id=48733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://code.google.com/p/chromium/issues/detail?id=48733" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/26/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/26/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/28/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/28/11" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/02/28/15", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/02/28/15" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1071.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1071.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1071", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89979", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89921", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89924", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89959", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89965", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89973", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89971", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05233", "scoring_system": "epss", "scoring_elements": "0.89964", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1071" }, { "reference_url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071" }, { "reference_url": "http://seclists.org/fulldisclosure/2011/Feb/635", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2011/Feb/635" }, { "reference_url": "http://seclists.org/fulldisclosure/2011/Feb/644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2011/Feb/644" }, { "reference_url": "http://secunia.com/advisories/43492", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43492" }, { "reference_url": "http://secunia.com/advisories/43830", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43830" }, { "reference_url": "http://secunia.com/advisories/43989", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43989" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://securityreason.com/securityalert/8175", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/8175" }, { "reference_url": "http://securitytracker.com/id?1025290", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025290" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/46563", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46563" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0863", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0863" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054", "reference_id": "681054", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17120.c", "reference_id": "CVE-2011-1071", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17120.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1071", "reference_id": "CVE-2011-1071", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1071" }, { "reference_url": "https://www.securityfocus.com/bid/46563/info", "reference_id": "CVE-2011-1071", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/46563/info" }, { "reference_url": "https://security.gentoo.org/glsa/201312-01", "reference_id": "GLSA-201312-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0412", "reference_id": "RHSA-2011:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0413", "reference_id": "RHSA-2011:0413", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0413" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://usn.ubuntu.com/1396-1/", "reference_id": "USN-1396-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1396-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2011-1071" ], "risk_score": 9.2, "exploitability": "2.0", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hu2t-wcga-c3e9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84601?format=api", "vulnerability_id": "VCID-jadt-55f6-uuh6", "summary": "glibc: Use-after-free read access in clntudp_call in sunrpc", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.6479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64744", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64749", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64781", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478288", "reference_id": "1478288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478288" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648", "reference_id": "870648", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648" }, { "reference_url": "https://security.archlinux.org/AVG-368", "reference_id": "AVG-368", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-368" }, { "reference_url": "https://security.archlinux.org/AVG-369", "reference_id": "AVG-369", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-369" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-12133" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jadt-55f6-uuh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85196?format=api", "vulnerability_id": "VCID-jnz7-w98a-kqgs", "summary": "glibc: getaddrinfo should reject IP addresses with trailing characters", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06387", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1233", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12189", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12192", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" }, { "reference_url": "http://www.securityfocus.com/bid/106672", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106672" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549", "reference_id": "1347549", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047", "reference_id": "920047", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047" }, { "reference_url": "https://security.archlinux.org/AVG-1984", "reference_id": "AVG-1984", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1984" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739", "reference_id": "CVE-2016-10739", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2118", "reference_id": "RHSA-2019:2118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3513", "reference_id": "RHSA-2019:3513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3513" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2016-10739" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnz7-w98a-kqgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61770?format=api", "vulnerability_id": "VCID-kpcn-f4dw-97hm", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21651", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21874", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21703", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21732", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21675", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544", "reference_id": "717544", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408", "reference_id": "976408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2013-2207" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90243?format=api", "vulnerability_id": "VCID-kqud-8xme-x7dq", "summary": "glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-0199.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-0199.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-1999-0199", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73867", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73877", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73908", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73959", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00793", "scoring_system": "epss", "scoring_elements": "0.73968", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-1999-0199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0199" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885775", "reference_id": "1885775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885775" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036019?format=api", "purl": "pkg:deb/debian/glibc@2.2.5-11.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-ag2y-afz2-33gu" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-atmj-ekuz-zyg8" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mrha-gp2j-vkf7" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-r6kw-vaat-mbav" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-vvkk-5k95-fqfk" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-11.8" } ], "aliases": [ "CVE-1999-0199" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kqud-8xme-x7dq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54413?format=api", "vulnerability_id": "VCID-kwbk-pngd-3bh9", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2015-0016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91606", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91551", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91579", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07187", "scoring_system": "epss", "scoring_elements": "0.91612", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" }, { "reference_url": "http://secunia.com/advisories/62100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62100" }, { "reference_url": "http://secunia.com/advisories/62146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62146" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17325" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6" }, { "reference_url": "http://ubuntu.com/usn/usn-2432-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-2432-1" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3142" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/29/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/08/29/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/02/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/09/02/1" }, { "reference_url": "http://www.securityfocus.com/bid/69472", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69472" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135841", "reference_id": "1135841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135841" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6040", "reference_id": "CVE-2014-6040", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6040" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0016", "reference_id": "RHSA-2015:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0327", "reference_id": "RHSA-2015:0327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0327" }, { "reference_url": "https://usn.ubuntu.com/2432-1/", "reference_id": "USN-2432-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2432-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036025?format=api", "purl": "pkg:deb/debian/glibc@2.19-12", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-12" } ], "aliases": [ "CVE-2014-6040" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwbk-pngd-3bh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83763?format=api", "vulnerability_id": "VCID-kxg9-kntn-xqan", "summary": "glibc: memory corruption in memcpy-sse2-unaligned.S", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18269", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78068", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78158", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.7812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78146", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/fingolfin/memmove-bug", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/fingolfin/memmove-bug" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22644" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580924", "reference_id": "1580924", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580924" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18269", "reference_id": "CVE-2017-18269", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18269" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-18269" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kxg9-kntn-xqan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61416?format=api", "vulnerability_id": "VCID-mqch-gxfq-zyhh", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12802", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.129", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12677", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670", "reference_id": "1810670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108", "reference_id": "953108", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2998", "reference_id": "RHSA-2021:2998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3315", "reference_id": "RHSA-2021:3315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3315" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-10029" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqch-gxfq-zyhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89879?format=api", "vulnerability_id": "VCID-mrha-gp2j-vkf7", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt" }, { "reference_url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P" }, { "reference_url": "http://archives.neohapsis.com/archives/aix/2002-q4/0002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://archives.neohapsis.com/archives/aix/2002-q4/0002.html" }, { "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html" }, { "reference_url": "http://archives.neohapsis.com/archives/hp/2002-q3/0077.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://archives.neohapsis.com/archives/hp/2002-q3/0077.html" }, { "reference_url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823" }, { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515" }, { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102813809232532&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://marc.info/?l=bugtraq&m=102813809232532&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102821785316087&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://marc.info/?l=bugtraq&m=102821785316087&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102821928418261&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://marc.info/?l=bugtraq&m=102821928418261&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102831443208382&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://marc.info/?l=bugtraq&m=102831443208382&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=103158632831416&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://marc.info/?l=bugtraq&m=103158632831416&w=2" }, { "reference_url": "http://online.securityfocus.com/advisories/4402", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://online.securityfocus.com/advisories/4402" }, { "reference_url": "http://online.securityfocus.com/archive/1/285740", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://online.securityfocus.com/archive/1/285740" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2002-166.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2002-166.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2002-172.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2002-172.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0391", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92243", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92214", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92234", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92235", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08258", "scoring_system": "epss", "scoring_elements": "0.92244", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0391" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391" }, { "reference_url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9" }, { "reference_url": "http://www.cert.org/advisories/CA-2002-25.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.cert.org/advisories/CA-2002-25.html" }, { "reference_url": "http://www.debian.org/security/2002/dsa-142", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.debian.org/security/2002/dsa-142" }, { "reference_url": "http://www.debian.org/security/2002/dsa-143", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.debian.org/security/2002/dsa-143" }, { "reference_url": "http://www.debian.org/security/2002/dsa-146", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.debian.org/security/2002/dsa-146" }, { "reference_url": "http://www.debian.org/security/2002/dsa-149", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.debian.org/security/2002/dsa-149" }, { "reference_url": "http://www.debian.org/security/2003/dsa-333", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.debian.org/security/2003/dsa-333" }, { "reference_url": "http://www.iss.net/security_center/static/9170.php", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.iss.net/security_center/static/9170.php" }, { "reference_url": "http://www.kb.cert.org/vuls/id/192995", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.kb.cert.org/vuls/id/192995" }, { "reference_url": "http://www.linuxsecurity.com/advisories/other_advisory-2399.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.linuxsecurity.com/advisories/other_advisory-2399.html" }, { "reference_url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2002-167.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2002-167.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2002-173.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2002-173.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2003-168.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2003-168.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2003-212.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2003-212.html" }, { "reference_url": "http://www.securityfocus.com/bid/5356", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/" } ], "url": "http://www.securityfocus.com/bid/5356" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616771", "reference_id": "1616771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616771" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*", "reference_id": "cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0391", "reference_id": "CVE-2002-0391", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:166", "reference_id": "RHSA-2002:166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:167", "reference_id": "RHSA-2002:167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:172", "reference_id": "RHSA-2002:172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:173", "reference_id": "RHSA-2002:173", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:168", "reference_id": "RHSA-2003:168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:212", "reference_id": "RHSA-2003:212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:212" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036020?format=api", "purl": "pkg:deb/debian/glibc@2.3.2.ds1-22sarge6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-22sarge6" } ], "aliases": [ "CVE-2002-0391" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mrha-gp2j-vkf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54415?format=api", "vulnerability_id": "VCID-mt93-6b2q-1faf", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.8487", "scoring_system": "epss", "scoring_elements": "0.99349", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.8487", "scoring_system": "epss", "scoring_elements": "0.99347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.8487", "scoring_system": "epss", "scoring_elements": "0.9935", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.9942", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.99416", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.99415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.99417", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.86966", "scoring_system": "epss", "scoring_elements": "0.99432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.86966", "scoring_system": "epss", "scoring_elements": "0.99431", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.86966", "scoring_system": "epss", "scoring_elements": "0.9943", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461", "reference_id": "1183461", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py", "reference_id": "CVE-2015-0235;OSVDB-117579", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb", "reference_id": "CVE-2015-0235;OSVDB-117579", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb" }, { "reference_url": "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt", "reference_id": "CVE-2015-0235;OSVDB-117579", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0090", "reference_id": "RHSA-2015:0090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0090" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0092", "reference_id": "RHSA-2015:0092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0099", "reference_id": "RHSA-2015:0099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0101", "reference_id": "RHSA-2015:0101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0126", "reference_id": "RHSA-2015:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0126" }, { "reference_url": "https://usn.ubuntu.com/2485-1/", "reference_id": "USN-2485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2485-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2015-0235" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92882?format=api", "vulnerability_id": "VCID-nj37-pefw-rfbt", "summary": "pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.", "references": [ { "reference_url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403" }, { "reference_url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958" }, { "reference_url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71703", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71697", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71617", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71623", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71641", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71654", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71688", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71672", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71653", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/02/23/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/07/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/03/07/2" }, { "reference_url": "http://www.securityfocus.com/bid/84601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84601" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt", "reference_id": "CVE-2016-2856", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2856", "reference_id": "CVE-2016-2856", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2856" }, { "reference_url": "http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/", "reference_id": "CVE-2016-2856", "reference_type": "exploit", "scores": [], "url": "http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-2856" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nj37-pefw-rfbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48727?format=api", "vulnerability_id": "VCID-njhs-qxym-mbdf", "summary": "Multiple vulnerabilities were found in glibc, the worst of which allowing\n local attackers to execute arbitrary code as root.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4881.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4881.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4881", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69633", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.6952", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69575", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69599", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69624", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4881" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201011-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201011-01.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59241" }, { "reference_url": "http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=153aa31b93be22e01b236375fb02a9f9b9a0195f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=153aa31b93be22e01b236375fb02a9f9b9a0195f" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2058" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=599095", "reference_id": "599095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599095" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4881", "reference_id": "CVE-2009-4881", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4881" }, { "reference_url": "https://security.gentoo.org/glsa/201011-01", "reference_id": "GLSA-201011-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201011-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2009-4881" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njhs-qxym-mbdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79939?format=api", "vulnerability_id": "VCID-nk5x-uhcf-7kan", "summary": "glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69418", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69407", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69398", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69369", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652", "reference_id": "2020652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622", "reference_id": "998622", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2021-43396" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61774?format=api", "vulnerability_id": "VCID-nrvz-y7zn-6bgu", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.9179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91804", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91825", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91832", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91835", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91837", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91833", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91853", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.9185", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178", "reference_id": "717178", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=985625", "reference_id": "985625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=985625" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c", "reference_id": "CVE-2013-4788;OSVDB-95392", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-4788" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrvz-y7zn-6bgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58063?format=api", "vulnerability_id": "VCID-ppaj-d4b9-wuhf", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91657", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.9167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.9168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91692", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199525", "reference_id": "1199525", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105", "reference_id": "796105", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0863", "reference_id": "RHSA-2015:0863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2199", "reference_id": "RHSA-2015:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-1781" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ppaj-d4b9-wuhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61417?format=api", "vulnerability_id": "VCID-pyms-pya1-buck", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33535", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33687", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33601", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33599", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33575", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810719", "reference_id": "1810719", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810719" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-1751" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyms-pya1-buck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84471?format=api", "vulnerability_id": "VCID-q5az-xe7k-m7av", "summary": "glibc: Fragmentation attacks possible when EDNS0 is enabled", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52657", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52758", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52795", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52702", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52745", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5274", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5279", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52774", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477529", "reference_id": "1477529", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477529" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650", "reference_id": "870650", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650" }, { "reference_url": "https://security.archlinux.org/AVG-368", "reference_id": "AVG-368", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-368" }, { "reference_url": "https://security.archlinux.org/AVG-369", "reference_id": "AVG-369", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-369" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-12132" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5az-xe7k-m7av" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31491?format=api", "vulnerability_id": "VCID-qaaq-fss4-1kgr", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.7801", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78027", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78026", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542102", "reference_id": "1542102", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542102" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159", "reference_id": "878159", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4218-1/", "reference_id": "USN-4218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4218-1/" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-6485" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qaaq-fss4-1kgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31492?format=api", "vulnerability_id": "VCID-qwx5-bayb-bkcg", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542119", "reference_id": "1542119", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542119" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-6551" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwx5-bayb-bkcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58064?format=api", "vulnerability_id": "VCID-r44h-gkxy-8kh2", "summary": "security update", "references": [ { "reference_url": "http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145596041017029&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145596041017029&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145672440608228&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145672440608228&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145690841819314&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145690841819314&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145857691004892&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145857691004892&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=146161017210491&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=146161017210491&w=2" }, { "reference_url": "http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html" }, { "reference_url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0175.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0175.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0176.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0176.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0225.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0225.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0277.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0277.html" }, { "reference_url": "https://access.redhat.com/articles/2161461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/articles/2161461" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93908", "scoring_system": "epss", "scoring_elements": "0.99875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.93908", "scoring_system": "epss", "scoring_elements": "0.99874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99883", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99884", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99882", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7547" }, { "reference_url": "https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/" }, { "reference_url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2021/Sep/0" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/Jun/36", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2022/Jun/36" }, { "reference_url": "https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "reference_url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "reference_url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160217-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20160217-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18665" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html" }, { "reference_url": "https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html" }, { "reference_url": "https://support.lenovo.com/us/en/product_security/len_5450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.lenovo.com/us/en/product_security/len_5450" }, { "reference_url": "http://support.citrix.com/article/CTX206991", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.citrix.com/article/CTX206991" }, { "reference_url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17" }, { "reference_url": "https://www.exploit-db.com/exploits/39454/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39454/" }, { "reference_url": "https://www.exploit-db.com/exploits/40339/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/40339/" }, { "reference_url": "https://www.kb.cert.org/vuls/id/457759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kb.cert.org/vuls/id/457759" }, { "reference_url": "https://www.tenable.com/security/research/tra-2017-08", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/research/tra-2017-08" }, { "reference_url": "http://ubuntu.com/usn/usn-2900-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-2900-1" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow" }, { "reference_url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/83265", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83265" }, { "reference_url": "http://www.securitytracker.com/id/1035020", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035020" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2016-0002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0002.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293532", "reference_id": "1293532", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293532" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py" }, { "reference_url": "https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" }, { "reference_url": "https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7547", "reference_id": "CVE-2015-7547", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7547" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0175", "reference_id": "RHSA-2016:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0176", "reference_id": "RHSA-2016:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0225", "reference_id": "RHSA-2016:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0225" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0277", "reference_id": "RHSA-2016:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0277" }, { "reference_url": "https://usn.ubuntu.com/2900-1/", "reference_id": "USN-2900-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2900-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-7547" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r44h-gkxy-8kh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89387?format=api", "vulnerability_id": "VCID-r6kw-vaat-mbav", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1382.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25052", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25175", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2506", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25075", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24984", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1382" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617410", "reference_id": "1617410", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617410" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:261", "reference_id": "RHSA-2005:261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:261" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036020?format=api", "purl": "pkg:deb/debian/glibc@2.3.2.ds1-22sarge6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-22sarge6" } ], "aliases": [ "CVE-2004-1382" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6kw-vaat-mbav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61765?format=api", "vulnerability_id": "VCID-rp43-q42n-jkh5", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html" }, { "reference_url": "http://osvdb.org/84710", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/84710" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1207.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1207.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1208.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1208.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42388", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42307", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42381", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42411", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.4235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42407", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42429", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42413", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480" }, { "reference_url": "http://secunia.com/advisories/50201", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50201" }, { "reference_url": "http://secunia.com/advisories/50422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50422" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=14459", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=14459" }, { "reference_url": "http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/08/13/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/08/13/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/08/13/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/08/13/6" }, { "reference_url": "http://www.securityfocus.com/bid/54982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/54982" }, { "reference_url": "http://www.securitytracker.com/id?1027374", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027374" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1589-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1589-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715", "reference_id": "847715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "reference_id": "CVE-2012-3480", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c", "reference_id": "CVE-2012-3480;OSVDB-84710", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c" }, { "reference_url": "https://www.securityfocus.com/bid/54982/info", "reference_id": "CVE-2012-3480;OSVDB-84710", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/54982/info" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1207", "reference_id": "RHSA-2012:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1208", "reference_id": "RHSA-2012:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1325", "reference_id": "RHSA-2012:1325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1325" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" }, { "reference_url": "https://usn.ubuntu.com/1589-2/", "reference_id": "USN-1589-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2012-3480" ], "risk_score": 8.2, "exploitability": "2.0", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rp43-q42n-jkh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87562?format=api", "vulnerability_id": "VCID-rq92-5scc-8uc7", "summary": "glibc: De-recursivise regular expression engine", "references": [ { "reference_url": "http://cxib.net/stuff/proftpd.gnu.c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cxib.net/stuff/proftpd.gnu.c" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4052.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93043", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93014", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93022", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93026", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93031", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.93029", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.9303", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09951", "scoring_system": "epss", "scoring_elements": "0.9304", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4052" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4052" }, { "reference_url": "http://seclists.org/fulldisclosure/2011/Jan/78", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2011/Jan/78" }, { "reference_url": "http://secunia.com/advisories/42547", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42547" }, { "reference_url": "http://securityreason.com/achievement_securityalert/93", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/achievement_securityalert/93" }, { "reference_url": "http://securitytracker.com/id?1024832", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024832" }, { "reference_url": "http://www.exploit-db.com/exploits/15935", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/15935" }, { "reference_url": "http://www.kb.cert.org/vuls/id/912279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/912279" }, { "reference_url": "http://www.securityfocus.com/archive/1/515589/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/515589/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/45233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45233" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=645859", "reference_id": "645859", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645859" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "http://securityreason.com/securityalert/8003", "reference_id": "CVE-2010-4051;CVE-2010-4052", "reference_type": "exploit", "scores": [], "url": "http://securityreason.com/securityalert/8003" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4052", "reference_id": "CVE-2010-4052", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4052" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35061.c", "reference_id": "CVE-2010-4052;OSVDB-70447", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35061.c" }, { "reference_url": "https://www.securityfocus.com/bid/45233/info", "reference_id": "CVE-2010-4052;OSVDB-70447", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/45233/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2010-4052" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rq92-5scc-8uc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39606?format=api", "vulnerability_id": "VCID-rqh3-5xc2-uyab", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000366", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91821", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91877", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91865", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91866", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91881", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91856", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543", "reference_id": "1452543", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543" }, { "reference_url": "https://security.archlinux.org/ASA-201706-22", "reference_id": "ASA-201706-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-22" }, { "reference_url": "https://security.archlinux.org/ASA-201706-23", "reference_id": "ASA-201706-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-23" }, { "reference_url": "https://security.archlinux.org/AVG-307", "reference_id": "AVG-307", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-307" }, { "reference_url": "https://security.archlinux.org/AVG-308", "reference_id": "AVG-308", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-308" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c", "reference_id": "CVE-2017-1000370;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c", "reference_id": "CVE-2017-1000370;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c", "reference_id": "CVE-2017-1000371;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c", "reference_id": "CVE-2017-1000371;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c", "reference_id": "CVE-2017-1000379;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c", "reference_id": "CVE-2017-1000379;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1479", "reference_id": "RHSA-2017:1479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1480", "reference_id": "RHSA-2017:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1481", "reference_id": "RHSA-2017:1481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1567", "reference_id": "RHSA-2017:1567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1567" }, { "reference_url": "https://usn.ubuntu.com/3323-1/", "reference_id": "USN-3323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3323-1/" }, { "reference_url": "https://usn.ubuntu.com/3323-2/", "reference_id": "USN-3323-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3323-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036033?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u10" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036929?format=api", "purl": "pkg:deb/debian/glibc@2.24-11%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-11%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000366" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqh3-5xc2-uyab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61413?format=api", "vulnerability_id": "VCID-rt4z-2rd4-qfde", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6488", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35489", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35505", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35514", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35471", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24097" }, { "reference_url": "http://www.securityfocus.com/bid/106671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106671" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667931", "reference_id": "1667931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667931" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6488", "reference_id": "CVE-2019-6488", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6488" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2019-6488" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rt4z-2rd4-qfde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58066?format=api", "vulnerability_id": "VCID-ru1q-qgq2-h7ct", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05306", "scoring_system": "epss", "scoring_elements": "0.90044", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.9171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91735", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91747", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18985" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/83277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83277" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300299", "reference_id": "1300299", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300299" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445", "reference_id": "812445", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8776", "reference_id": "CVE-2015-8776", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P" }, { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8776" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8776" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ru1q-qgq2-h7ct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43776?format=api", "vulnerability_id": "VCID-sbzq-gp2e-v7fy", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25013", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74179", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74088", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.7409", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74171", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74133", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74157", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74121", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960", "reference_id": "1912960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/", "reference_id": "4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273", "reference_id": "979273", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210205-0004/", "reference_id": "ntap-20210205-0004", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210205-0004/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b" }, { "reference_url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E", "reference_id": "r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E", "reference_id": "r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E", "reference_id": "r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E", "reference_id": "r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E", "reference_id": "r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E", "reference_id": "r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E", "reference_id": "r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E", "reference_id": "rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24973", "reference_id": "show_bug.cgi?id=24973", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/", "reference_id": "TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2019-25013" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sbzq-gp2e-v7fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=api", "vulnerability_id": "VCID-sjav-8bub-eycz", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99712", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.9971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92578", "scoring_system": "epss", "scoring_elements": "0.99739", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191", "reference_id": "1069191", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/24/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/24/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404", "reference_id": "2273404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/18/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/17/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/17/9" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/", "reference_id": "BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004", "reference_id": "GLIBC-SA-2024-0004", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0002/", "reference_id": "ntap-20240531-0002", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240531-0002/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/", "reference_id": "P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2722", "reference_id": "RHSA-2024:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3269", "reference_id": "RHSA-2024:3269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7590", "reference_id": "RHSA-2024:7590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7594", "reference_id": "RHSA-2024:7594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7599", "reference_id": "RHSA-2024:7599", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7939", "reference_id": "RHSA-2024:7939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8235", "reference_id": "RHSA-2024:8235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8235" }, { "reference_url": "https://usn.ubuntu.com/6737-1/", "reference_id": "USN-6737-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6737-1/" }, { "reference_url": "https://usn.ubuntu.com/6737-2/", "reference_id": "USN-6737-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6737-2/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/", "reference_id": "YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-2961" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61764?format=api", "vulnerability_id": "VCID-skgp-p9xp-k3cf", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71218", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71271", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71256", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.7124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71287", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71293", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473", "reference_id": "681473", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=833704", "reference_id": "833704", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833704" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098", "reference_id": "RHSA-2012:1098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200", "reference_id": "RHSA-2012:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1200" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2012-3405" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skgp-p9xp-k3cf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61769?format=api", "vulnerability_id": "VCID-tdxd-r347-3yex", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1914", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03104", "scoring_system": "epss", "scoring_elements": "0.86831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03104", "scoring_system": "epss", "scoring_elements": "0.86827", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87403", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.8741", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1914" }, { "reference_url": "https://bugzilla.novell.com/show_bug.cgi?id=813121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.novell.com/show_bug.cgi?id=813121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2021/Sep/0" }, { "reference_url": "http://secunia.com/advisories/52817", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52817" }, { "reference_url": "http://secunia.com/advisories/55113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55113" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15330", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15330" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:284", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:284" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/03/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/03/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/03/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/03/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/05/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/05/1" }, { "reference_url": "http://www.securityfocus.com/bid/58839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/58839" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1991-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1991-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623", "reference_id": "704623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=947882", "reference_id": "947882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=947882" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1914", "reference_id": "CVE-2013-1914", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1914" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0769", "reference_id": "RHSA-2013:0769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605", "reference_id": "RHSA-2013:1605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1605" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-1914" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85787?format=api", "vulnerability_id": "VCID-tp9v-vmge-nkdf", "summary": "glibc: _IO_wstr_overflow integer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8983", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67025", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66956", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66981", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67005", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67037", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67022", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17269" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/72740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72740" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195762", "reference_id": "1195762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195762" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587", "reference_id": "779587", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8983", "reference_id": "CVE-2015-8983", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8983" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8983" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tp9v-vmge-nkdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88888?format=api", "vulnerability_id": "VCID-twn9-zhjq-uqe6", "summary": "glibc: Not closing unhadleable client sockets due to nscd daemon leads to DoS.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7254.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7254.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7254", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12872", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12728", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12821", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12725", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13014", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12815", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12893", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12944", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12867", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7254" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7254", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7254" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=2498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=2498" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698738", "reference_id": "1698738", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698738" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7254", "reference_id": "CVE-2006-7254", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7254" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036023?format=api", "purl": "pkg:deb/debian/glibc@2.7-18lenny7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-18lenny7" } ], "aliases": [ "CVE-2006-7254" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twn9-zhjq-uqe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83453?format=api", "vulnerability_id": "VCID-uqdb-tx7y-bbbc", "summary": "glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73959", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74055", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.7401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74032", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196" }, { "reference_url": "https://www.exploit-db.com/exploits/44750/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44750/" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.securityfocus.com/bid/104256", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104256" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581274", "reference_id": "1581274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581274" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070", "reference_id": "899070", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11237", "reference_id": "CVE-2018-11237", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-11237" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqdb-tx7y-bbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36350?format=api", "vulnerability_id": "VCID-utss-75dn-r3b7", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41953", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41931", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41945", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41972", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41983", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8985" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/76916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/76916" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197798", "reference_id": "1197798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197798" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8985", "reference_id": "CVE-2015-8985", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8985" }, { "reference_url": "https://security.gentoo.org/glsa/201908-06", "reference_id": "GLSA-201908-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2015-8985" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utss-75dn-r3b7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82654?format=api", "vulnerability_id": "VCID-v7ut-qjzy-2yfs", "summary": "glibc: buffer overflow in getgrouplist function leading to corrupted memory", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3590.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62295", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62243", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62288", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62192", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62223", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.6219", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62265", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3590" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=661" }, { "reference_url": "https://support.f5.com/csp/article/K12740406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K12740406" }, { "reference_url": "http://www.securityfocus.com/bid/107871", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107871" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706046", "reference_id": "1706046", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706046" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3590", "reference_id": "CVE-2005-3590", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3590" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036021?format=api", "purl": "pkg:deb/debian/glibc@2.3.6.ds1-13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.6.ds1-13" } ], "aliases": [ "CVE-2005-3590" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ut-qjzy-2yfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59733?format=api", "vulnerability_id": "VCID-v96m-se3g-8ydp", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61384", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61509", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.6155", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61461", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61489", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61543", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61529", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428290", "reference_id": "1428290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428290" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503", "reference_id": "856503", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2016-10228" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v96m-se3g-8ydp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36352?format=api", "vulnerability_id": "VCID-vajf-thpr-pbat", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80134", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80141", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80186", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.8015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82711", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82677", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82673", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.8271", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591" }, { "reference_url": "http://www.securitytracker.com/id/1042174", "reference_id": "1042174", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "http://www.securitytracker.com/id/1042174" }, { "reference_url": "http://www.securityfocus.com/bid/106037", "reference_id": "106037", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "http://www.securityfocus.com/bid/106037" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653993", "reference_id": "1653993", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653993" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837", "reference_id": "914837", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837" }, { "reference_url": "https://security.archlinux.org/AVG-830", "reference_id": "AVG-830", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-830" }, { "reference_url": "https://security.archlinux.org/AVG-831", "reference_id": "AVG-831", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-831" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/", "reference_id": "BO7WHN52GFMC5F2I2232GFIPSSXWFV7G", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408", "reference_id": "gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408" }, { "reference_url": "https://security.gentoo.org/glsa/201903-09", "reference_id": "GLSA-201903-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.gentoo.org/glsa/201903-09" }, { "reference_url": "https://security.gentoo.org/glsa/201908-06", "reference_id": "GLSA-201908-06", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.gentoo.org/glsa/201908-06" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/", "reference_id": "M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190321-0003/", "reference_id": "ntap-20190321-0003", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20190321-0003/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD", "reference_id": "?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23927", "reference_id": "show_bug.cgi?id=23927", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23927" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-19591" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vajf-thpr-pbat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39601?format=api", "vulnerability_id": "VCID-vake-u1n1-x3hx", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.6116", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61318", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.6124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61269", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72885", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249603", "reference_id": "1249603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249603" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106", "reference_id": "796106", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036928?format=api", "purl": "pkg:deb/debian/glibc@2.24-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-10" } ], "aliases": [ "CVE-2015-5180" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vake-u1n1-x3hx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48729?format=api", "vulnerability_id": "VCID-vcf1-m7tr-zbgc", "summary": "Multiple vulnerabilities were found in glibc, the worst of which allowing\n local attackers to execute arbitrary code as root.", "references": [ { "reference_url": "http://frugalware.org/security/662", "reference_id": "", "reference_type": "", "scores": [], "url": "http://frugalware.org/security/662" }, { "reference_url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0296.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0296.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0296", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30497", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30523", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30569", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30439", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30432", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30401", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jun/18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jun/18" }, { "reference_url": "http://secunia.com/advisories/39900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39900" }, { "reference_url": "http://secunia.com/advisories/43830", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43830" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201011-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201011-01.xml" }, { "reference_url": "http://securitytracker.com/id?1024043", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024043" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59240" }, { "reference_url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jun/14" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2058" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.ubuntu.com/usn/USN-944-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-944-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1246" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0863", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0863" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=559579", "reference_id": "559579", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559579" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583908", "reference_id": "583908", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583908" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0296", "reference_id": "CVE-2010-0296", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0296" }, { "reference_url": "https://security.gentoo.org/glsa/201011-01", "reference_id": "GLSA-201011-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201011-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0412", "reference_id": "RHSA-2011:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://usn.ubuntu.com/944-1/", "reference_id": "USN-944-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/944-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2010-0296" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vcf1-m7tr-zbgc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61186?format=api", "vulnerability_id": "VCID-ven5-emb5-a7bh", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2172.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2172.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28039", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28065", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28022", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27974", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17079" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/78092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/78092" }, { "reference_url": "http://www.securitytracker.com/id/1034196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034196" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262914", "reference_id": "1262914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262914" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966", "reference_id": "799966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5277", "reference_id": "CVE-2015-5277", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5277" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2172", "reference_id": "RHSA-2015:2172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-5277" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ven5-emb5-a7bh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59734?format=api", "vulnerability_id": "VCID-vqyv-kf5w-vkch", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1752", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40442", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40469", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40515", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40495", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40543", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40511", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810718", "reference_id": "1810718", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810718" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788", "reference_id": "953788", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-1752" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyv-kf5w-vkch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57869?format=api", "vulnerability_id": "VCID-vttu-hcan-6fba", "summary": "security update", "references": [ { "reference_url": "http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2015-0092.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0092.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1118.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1118.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5119.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5119.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21511", "scoring_system": "epss", "scoring_elements": "0.95727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21511", "scoring_system": "epss", "scoring_elements": "0.95723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95759", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.9577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95743", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95778", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95779", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22024", "scoring_system": "epss", "scoring_elements": "0.95752", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5119" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=96", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=96" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" }, { "reference_url": "http://seclists.org/fulldisclosure/2014/Aug/69", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2014/Aug/69" }, { "reference_url": "http://secunia.com/advisories/60345", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60345" }, { "reference_url": "http://secunia.com/advisories/60358", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60358" }, { "reference_url": "http://secunia.com/advisories/60441", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60441" }, { "reference_url": "http://secunia.com/advisories/61074", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61074" }, { "reference_url": "http://secunia.com/advisories/61093", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61093" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2014-1110.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2014-1110.html" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17187" }, { "reference_url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119", "reference_id": "", "reference_type": "", "scores": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3012" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/14/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/14/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/13/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/08/13/5" }, { "reference_url": "http://www.securityfocus.com/bid/68983", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68983" }, { "reference_url": "http://www.securityfocus.com/bid/69738", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69738" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1119128", "reference_id": "1119128", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1119128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5119", "reference_id": "CVE-2014-5119", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5119" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34421.c", "reference_id": "CVE-2014-5119;OSVDB-109188", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34421.c" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1110", "reference_id": "RHSA-2014:1110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1118", "reference_id": "RHSA-2014:1118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1118" }, { "reference_url": "https://usn.ubuntu.com/2328-1/", "reference_id": "USN-2328-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2328-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2014-5119" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vttu-hcan-6fba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89404?format=api", "vulnerability_id": "VCID-vvkk-5k95-fqfk", "summary": "security flaw", "references": [ { "reference_url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0968.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0968.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0968", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.2198", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21945", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22106", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22155", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21937", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22018", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22087", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22046", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21986", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21984", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0968" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200410-19.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200410-19.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523" }, { "reference_url": "https://www.ubuntu.com/usn/usn-4-1/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.ubuntu.com/usn/usn-4-1/" }, { "reference_url": "http://www.debian.org/security/2005/dsa-636", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-636" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2004-586.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-586.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-261.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-261.html" }, { "reference_url": "http://www.securityfocus.com/bid/11286", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/11286" }, { "reference_url": "http://www.trustix.org/errata/2004/0050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2004/0050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617335", "reference_id": "1617335", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617335" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0968", "reference_id": "CVE-2004-0968", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:586", "reference_id": "RHSA-2004:586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:261", "reference_id": "RHSA-2005:261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:261" }, { "reference_url": "https://usn.ubuntu.com/4-1/", "reference_id": "USN-4-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036020?format=api", "purl": "pkg:deb/debian/glibc@2.3.2.ds1-22sarge6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-22sarge6" } ], "aliases": [ "CVE-2004-0968" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvkk-5k95-fqfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61773?format=api", "vulnerability_id": "VCID-w1zk-1c5m-3fb2", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78908", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78914", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.7892", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78929", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78948", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78945", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280", "reference_id": "1022280", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181", "reference_id": "727181", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1391", "reference_id": "RHSA-2014:1391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1391" }, { "reference_url": "https://usn.ubuntu.com/2306-1/", "reference_id": "USN-2306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2306-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-4458" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1zk-1c5m-3fb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56594?format=api", "vulnerability_id": "VCID-w5hj-83tc-fufp", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2015-0092.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0092.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0475.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0475.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69625", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69511", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69537", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69516", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69567", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69605", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69616", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2014-1110.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2014-1110.html" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17137" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2976" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/10/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/10/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/14/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/14/6" }, { "reference_url": "http://www.securityfocus.com/bid/68505", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68505" }, { "reference_url": "http://www.securitytracker.com/id/1030569", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030569" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102353", "reference_id": "1102353", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102353" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0475", "reference_id": "CVE-2014-0475", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0475" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1110", "reference_id": "RHSA-2014:1110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1110" }, { "reference_url": "https://usn.ubuntu.com/2306-1/", "reference_id": "USN-2306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2306-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2014-0475" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5hj-83tc-fufp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48730?format=api", "vulnerability_id": "VCID-w8rc-tnpk-83c4", "summary": "Multiple vulnerabilities were found in glibc, the worst of which allowing\n local attackers to execute arbitrary code as root.", "references": [ { "reference_url": "http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html" }, { "reference_url": "http://frugalware.org/security/662", "reference_id": "", "reference_type": "", "scores": [], "url": "http://frugalware.org/security/662" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.9097", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90897", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90922", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90939", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90948", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90947", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06292", "scoring_system": "epss", "scoring_elements": "0.90972", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0830" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830" }, { "reference_url": "http://secunia.com/advisories/39900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39900" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201011-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201011-01.xml" }, { "reference_url": "http://securitytracker.com/id?1024044", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024044" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58915" }, { "reference_url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2058" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:111" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:112" }, { "reference_url": "http://www.securityfocus.com/bid/40063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40063" }, { "reference_url": "http://www.ubuntu.com/usn/USN-944-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-944-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1246" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=599056", "reference_id": "599056", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599056" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0830", "reference_id": "CVE-2010-0830", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0830" }, { "reference_url": "https://security.gentoo.org/glsa/201011-01", "reference_id": "GLSA-201011-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201011-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0126", "reference_id": "RHSA-2012:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0126" }, { "reference_url": "https://usn.ubuntu.com/944-1/", "reference_id": "USN-944-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/944-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2010-0830" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8rc-tnpk-83c4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31486?format=api", "vulnerability_id": "VCID-wctr-ebf2-gqa1", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44273", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44302", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22320" }, { "reference_url": "http://www.securityfocus.com/bid/101521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101521" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504804", "reference_id": "1504804", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504804" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501", "reference_id": "879501", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501" }, { "reference_url": "https://security.archlinux.org/ASA-201801-8", "reference_id": "ASA-201801-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-8" }, { "reference_url": "https://security.archlinux.org/ASA-201801-9", "reference_id": "ASA-201801-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-9" }, { "reference_url": "https://security.archlinux.org/AVG-460", "reference_id": "AVG-460", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670", "reference_id": "CVE-2017-15670", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1879", "reference_id": "RHSA-2018:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1879" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15670" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wctr-ebf2-gqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58068?format=api", "vulnerability_id": "VCID-weg2-kxcj-fkcg", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06102", "scoring_system": "epss", "scoring_elements": "0.90802", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92974", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92949", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.9296", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92965", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92963", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18240" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/83275", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83275" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300303", "reference_id": "1300303", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300303" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441", "reference_id": "812441", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8778", "reference_id": "CVE-2015-8778", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8778" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8778" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-weg2-kxcj-fkcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89894?format=api", "vulnerability_id": "VCID-wj8t-9j8k-wuap", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39" }, { "reference_url": "ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37" }, { "reference_url": "ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I/", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I/" }, { "reference_url": "http://archives.neohapsis.com/archives/aix/2002-q3/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/aix/2002-q3/0001.html" }, { "reference_url": "http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html" }, { "reference_url": "http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html" }, { "reference_url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507" }, { "reference_url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038", "reference_id": "", "reference_type": "", "scores": [], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102513011311504&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=102513011311504&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102520962320134&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=102520962320134&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=102579743329251&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=102579743329251&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2002-139.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2002-139.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0651.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0651.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0651", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91651", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91602", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91641", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91637", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07259", "scoring_system": "epss", "scoring_elements": "0.91658", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0651" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4190" }, { "reference_url": "http://www.cert.org/advisories/CA-2002-19.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cert.org/advisories/CA-2002-19.html" }, { "reference_url": "http://www.iss.net/security_center/static/9432.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.iss.net/security_center/static/9432.php" }, { "reference_url": "http://www.kb.cert.org/vuls/id/803539", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/803539" }, { "reference_url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-043.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-043.php" }, { "reference_url": "http://www.pine.nl/advisories/pine-cert-20020601.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pine.nl/advisories/pine-cert-20020601.txt" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2002-119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2002-119.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2002-133.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2002-133.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2002-167.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2002-167.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2003-154.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2003-154.html" }, { "reference_url": "http://www.securityfocus.com/bid/5100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/5100" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616785", "reference_id": "1616785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616785" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0651", "reference_id": "CVE-2002-0651", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0651" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:119", "reference_id": "RHSA-2002:119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:133", "reference_id": "RHSA-2002:133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:139", "reference_id": "RHSA-2002:139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:167", "reference_id": "RHSA-2002:167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:154", "reference_id": "RHSA-2003:154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:154" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036019?format=api", "purl": "pkg:deb/debian/glibc@2.2.5-11.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-1971-5hzf-43dt" }, { "vulnerability": "VCID-22vv-9xn4-vyap" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2pd1-hkrf-j7e5" }, { "vulnerability": "VCID-2tet-rxt9-n3ac" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-3yq4-pzqz-4yap" }, { "vulnerability": "VCID-42jj-9jmf-s3h5" }, { "vulnerability": "VCID-481z-kryb-97d5" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6fwn-j4p2-ffh9" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-746m-vcyt-97gh" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7czm-1nzx-nfbn" }, { "vulnerability": "VCID-7d3q-a8t2-s3d8" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-7xzr-rdk3-cfhg" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-9tjq-wrg8-7bfw" }, { "vulnerability": "VCID-9wwp-9dpd-s7he" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-ag2y-afz2-33gu" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-atmj-ekuz-zyg8" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bfkj-w1s6-67bc" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-byqx-z785-6qcq" }, { "vulnerability": "VCID-c2yx-a4d3-q7d8" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cktt-pktd-ffat" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-e9fg-s2r5-qfc2" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7mh-4xkf-7fha" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-gbqk-t5bg-dyby" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-hu2t-wcga-c3e9" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-mrha-gp2j-vkf7" }, { "vulnerability": "VCID-mt93-6b2q-1faf" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-njhs-qxym-mbdf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-nrvz-y7zn-6bgu" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-r6kw-vaat-mbav" }, { "vulnerability": "VCID-rp43-q42n-jkh5" }, { "vulnerability": "VCID-rq92-5scc-8uc7" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-skgp-p9xp-k3cf" }, { "vulnerability": "VCID-tdxd-r347-3yex" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-twn9-zhjq-uqe6" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v7ut-qjzy-2yfs" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vcf1-m7tr-zbgc" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-vttu-hcan-6fba" }, { "vulnerability": "VCID-vvkk-5k95-fqfk" }, { "vulnerability": "VCID-w1zk-1c5m-3fb2" }, { "vulnerability": "VCID-w5hj-83tc-fufp" }, { "vulnerability": "VCID-w8rc-tnpk-83c4" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-y19v-br6n-3ybf" }, { "vulnerability": "VCID-ydrg-f673-53gv" }, { "vulnerability": "VCID-yh8v-ebxn-z7dp" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-za5g-uj5p-5kd4" }, { "vulnerability": "VCID-zhzd-f8a6-juaa" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-11.8" } ], "aliases": [ "CVE-2002-0651" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wj8t-9j8k-wuap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31489?format=api", "vulnerability_id": "VCID-wp12-z5a5-pbgd", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75266", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75355", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.7527", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.7528", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75334", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16997" }, { "reference_url": "https://bugs.debian.org/884615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/884615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22625" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html" }, { "reference_url": "http://www.securityfocus.com/bid/102228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102228" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526865", "reference_id": "1526865", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526865" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615", "reference_id": "884615", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997", "reference_id": "CVE-2017-16997", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-16997" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp12-z5a5-pbgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62169?format=api", "vulnerability_id": "VCID-wp18-zqr6-a3ag", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017", "reference_id": "2042017", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542", "reference_id": "show_bug.cgi?id=22542", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2022-23219" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp18-zqr6-a3ag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31490?format=api", "vulnerability_id": "VCID-ww2m-6691-yfa7", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97412", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97399", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.974", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97409", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.9739", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97396", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97524", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97518", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533836", "reference_id": "1533836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001", "reference_id": "887001", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001" }, { "reference_url": "https://security.archlinux.org/ASA-201801-18", "reference_id": "ASA-201801-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-18" }, { "reference_url": "https://security.archlinux.org/ASA-201801-19", "reference_id": "ASA-201801-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-19" }, { "reference_url": "https://security.archlinux.org/AVG-590", "reference_id": "AVG-590", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-590" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb" }, { "reference_url": "https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" }, { "reference_url": "https://usn.ubuntu.com/3536-1/", "reference_id": "USN-3536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3536-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-4768-1/", "reference_id": "USN-USN-4768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-1000001" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ww2m-6691-yfa7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=api", "vulnerability_id": "VCID-xhcm-t8jb-ybfb", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63673", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63661", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63676", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.6366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63664", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206", "reference_id": "2277206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008", "reference_id": "GLIBC-SA-2024-0008", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0012/", "reference_id": "ntap-20240524-0012", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0012/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33602" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85805?format=api", "vulnerability_id": "VCID-xyvn-w5ac-yqcn", "summary": "glibc: multiple overflows in strxfrm()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79824", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79795", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79823", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79746", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79754", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79761", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.7979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79797", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79819", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79803", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16009" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/02/13/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/02/13/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/72602", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72602" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192525", "reference_id": "1192525", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927", "reference_id": "803927", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8982", "reference_id": "CVE-2015-8982", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8982" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8982" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyvn-w5ac-yqcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57214?format=api", "vulnerability_id": "VCID-y19v-br6n-3ybf", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing arbitrary code execution and privilege escalation.", "references": [ { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=330923", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=330923" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/21", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/21" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/22", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/22" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/03/08/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/03/08/8" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1095.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1095.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1095", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24946", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25018", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25095", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24908", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24976", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24995", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24941", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24954", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095" }, { "reference_url": "http://secunia.com/advisories/43830", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43830" }, { "reference_url": "http://secunia.com/advisories/43976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43976" }, { "reference_url": "http://secunia.com/advisories/43989", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43989" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201011-01.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201011-01.xml" }, { "reference_url": "http://securitytracker.com/id?1025286", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1025286" }, { "reference_url": "http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11904", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11904" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=patch%3Bh=026373745eab50a683536d950cb7e17dc98c4259", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=patch%3Bh=026373745eab50a683536d950cb7e17dc98c4259" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12272" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0863", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0863" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625893", "reference_id": "625893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625893" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1095", "reference_id": "CVE-2011-1095", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1095" }, { "reference_url": "https://security.gentoo.org/glsa/201312-01", "reference_id": "GLSA-201312-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0412", "reference_id": "RHSA-2011:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0413", "reference_id": "RHSA-2011:0413", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0413" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://usn.ubuntu.com/1396-1/", "reference_id": "USN-1396-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1396-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2011-1095" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y19v-br6n-3ybf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61772?format=api", "vulnerability_id": "VCID-ydrg-f673-53gv", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81904", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81915", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81934", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81968", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.82007", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007545", "reference_id": "1007545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007545" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536", "reference_id": "722536", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1411", "reference_id": "RHSA-2013:1411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605", "reference_id": "RHSA-2013:1605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1605" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-4332" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrg-f673-53gv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61771?format=api", "vulnerability_id": "VCID-yh8v-ebxn-z7dp", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77497", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77528", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77538", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77547", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77558", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77594", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77592", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558", "reference_id": "719558", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839", "reference_id": "995839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1391", "reference_id": "RHSA-2014:1391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1391" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-4237" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yh8v-ebxn-z7dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61864?format=api", "vulnerability_id": "VCID-ys5d-7xgp-w7g5", "summary": "A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21718", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21899", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21664", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21798", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21808", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21768", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21711", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html", "reference_id": "000044.html", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460", "reference_id": "2339460", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2025/01/22/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2025/01/22/4" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001", "reference_id": "GLIBC-SA-2025-0001", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001" }, { "reference_url": "https://security.gentoo.org/glsa/202505-06", "reference_id": "GLSA-202505-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3828", "reference_id": "RHSA-2025:3828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4241", "reference_id": "RHSA-2025:4241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4242", "reference_id": "RHSA-2025:4242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4243", "reference_id": "RHSA-2025:4243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4244", "reference_id": "RHSA-2025:4244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4244" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582", "reference_id": "show_bug.cgi?id=32582", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582" }, { "reference_url": "https://usn.ubuntu.com/7259-1/", "reference_id": "USN-7259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-1/" }, { "reference_url": "https://usn.ubuntu.com/7259-2/", "reference_id": "USN-7259-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-2/" }, { "reference_url": "https://usn.ubuntu.com/7259-3/", "reference_id": "USN-7259-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api", "purl": "pkg:deb/debian/glibc@2.36-8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8" } ], "aliases": [ "CVE-2025-0395" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54414?format=api", "vulnerability_id": "VCID-ywmm-hzmg-z3b4", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2015-0016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0016.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2015-0092.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0092.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-2023.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36625", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.3663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36596", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36642", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" }, { "reference_url": "http://seclists.org/oss-sec/2014/q4/730", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/oss-sec/2014/q4/730" }, { "reference_url": "http://secunia.com/advisories/62100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62100" }, { "reference_url": "http://secunia.com/advisories/62146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62146" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98852" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17625" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3142" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "reference_url": "http://www.securityfocus.com/bid/71216", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71216" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2432-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2432-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157689", "reference_id": "1157689", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157689" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572", "reference_id": "775572", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7817", "reference_id": "CVE-2014-7817", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7817" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2023", "reference_id": "RHSA-2014:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0016", "reference_id": "RHSA-2015:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0016" }, { "reference_url": "https://usn.ubuntu.com/2432-1/", "reference_id": "USN-2432-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2432-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2014-7817" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ywmm-hzmg-z3b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84958?format=api", "vulnerability_id": "VCID-z2xd-8n4a-b3cp", "summary": "glibc: per-thread memory leak in __res_vinit with IPv6 nameservers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78734", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.7878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78813", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.7881", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362534", "reference_id": "1362534", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362534" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302", "reference_id": "833302", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-5417" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z2xd-8n4a-b3cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61768?format=api", "vulnerability_id": "VCID-za5g-uj5p-5kd4", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "http://osvdb.org/89747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/89747" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84105", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84116", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84112", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84134", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0242" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" }, { "reference_url": "http://secunia.com/advisories/51951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51951" }, { "reference_url": "http://secunia.com/advisories/55113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55113" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078" }, { "reference_url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/01/30/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/01/30/5" }, { "reference_url": "http://www.securityfocus.com/bid/57638", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/57638" }, { "reference_url": "http://www.securitytracker.com/id/1028063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1028063" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1991-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1991-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399", "reference_id": "699399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=905874", "reference_id": "905874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=905874" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0242", "reference_id": "CVE-2013-0242", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0242" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0769", "reference_id": "RHSA-2013:0769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605", "reference_id": "RHSA-2013:1605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1605" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2013-0242" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57216?format=api", "vulnerability_id": "VCID-zhzd-f8a6-juaa", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing arbitrary code execution and privilege escalation.", "references": [ { "reference_url": "http://code.google.com/p/chromium/issues/detail?id=48733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://code.google.com/p/chromium/issues/detail?id=48733" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1659.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1659.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85304", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85211", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85243", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85265", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85273", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85287", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85285", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85282", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02476", "scoring_system": "epss", "scoring_elements": "0.85303", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1659" }, { "reference_url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659" }, { "reference_url": "http://secunia.com/advisories/44353", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44353" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66819", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66819" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12583", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=12583" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=8126d90480fa3e0c5c5cd0d02cb1c93174b45485", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=8126d90480fa3e0c5c5cd0d02cb1c93174b45485" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securitytracker.com/id?1025450", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1025450" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054", "reference_id": "681054", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1659", "reference_id": "CVE-2011-1659", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1659" }, { "reference_url": "https://security.gentoo.org/glsa/201312-01", "reference_id": "GLSA-201312-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0412", "reference_id": "RHSA-2011:0412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0413", "reference_id": "RHSA-2011:0413", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0413" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0125", "reference_id": "RHSA-2012:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0125" }, { "reference_url": "https://usn.ubuntu.com/1396-1/", "reference_id": "USN-1396-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1396-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036024?format=api", "purl": "pkg:deb/debian/glibc@2.19-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-4nf7-929x-4bb1" }, { "vulnerability": "VCID-5g37-r914-r3g8" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-aapy-xr76-zbc4" }, { "vulnerability": "VCID-aq6k-yr6s-4ygw" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hkyd-8rrg-v3e7" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kwbk-pngd-3bh9" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-ywmm-hzmg-z3b4" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-11" } ], "aliases": [ "CVE-2011-1659" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zhzd-f8a6-juaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78322?format=api", "vulnerability_id": "VCID-zk4w-q3pr-myh6", "summary": "glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with \"**(!()\" pattern", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-20109", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08329", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08384", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08359", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08429", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08419", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-20109" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217330", "reference_id": "2217330", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217330" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230731-0009/", "reference_id": "ntap-20230731-0009", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230731-0009/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18036", "reference_id": "show_bug.cgi?id=18036", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18036" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-20109" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zk4w-q3pr-myh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43778?format=api", "vulnerability_id": "VCID-zqx5-4rdk-1qa3", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11057", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11232", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11242", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11048", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589", "reference_id": "1932589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/", "reference_id": "7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479", "reference_id": "983479", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/", "reference_id": "I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462", "reference_id": "show_bug.cgi?id=27462", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api", "purl": "pkg:deb/debian/glibc@2.31-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11" } ], "aliases": [ "CVE-2021-27645" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.0.7.19981211-6" }