Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1036027?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "type": "deb", "namespace": "debian", "name": "glibc", "version": "2.19-15", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.36-8", "latest_non_vulnerable_version": "2.42-15", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43777?format=api", "vulnerability_id": "VCID-13gq-1x22-skhy", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1686", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16849", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17028", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16952", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1701", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16985", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16819", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893708", "reference_id": "1893708", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893708" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914", "reference_id": "973914", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210401-0006/", "reference_id": "ntap-20210401-0006", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210401-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21", "reference_id": "show_bug.cgi?id=19519#c21", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224", "reference_id": "show_bug.cgi?id=26224", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-27618" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13gq-1x22-skhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62168?format=api", "vulnerability_id": "VCID-2gmq-64e3-c7db", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.5946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66912", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013", "reference_id": "2042013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768", "reference_id": "show_bug.cgi?id=28768", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2022-23218" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gmq-64e3-c7db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61185?format=api", "vulnerability_id": "VCID-2tgj-syh1-pqaj", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9761", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03577", "scoring_system": "epss", "scoring_elements": "0.87751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03577", "scoring_system": "epss", "scoring_elements": "0.8775", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88127", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88078", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88143", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88135", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.8815", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88133", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03823", "scoring_system": "epss", "scoring_elements": "0.88087", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jun/18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jun/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jun/14" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16962" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/83306", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83306" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300310", "reference_id": "1300310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300310" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187", "reference_id": "813187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9761", "reference_id": "CVE-2014-9761", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9761" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2014-9761" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2tgj-syh1-pqaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=api", "vulnerability_id": "VCID-3hqs-jns2-puf2", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.7018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70165", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70196", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70205", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75216", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202", "reference_id": "2277202", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005", "reference_id": "GLIBC-SA-2024-0005", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0011/", "reference_id": "ntap-20240524-0011", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0011/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33599" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81840?format=api", "vulnerability_id": "VCID-6kb1-yuq8-tfbs", "summary": "glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03129", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06277", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06327", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06404", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06399", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25204" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681", "reference_id": "1774681", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250", "reference_id": "945250", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126", "reference_id": "CVE-2019-19126", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1828", "reference_id": "RHSA-2020:1828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3861", "reference_id": "RHSA-2020:3861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2019-19126" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kb1-yuq8-tfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62165?format=api", "vulnerability_id": "VCID-6qa1-upks-g3dm", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74883", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74808", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74858", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74892", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637", "reference_id": "2024637", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/24/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/01/24/4" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3999", "reference_id": "CVE-2021-3999", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2021-3999" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2021-3999", "reference_id": "CVE-2021-3999", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-3999" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e", "reference_id": "gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221104-0001/", "reference_id": "ntap-20221104-0001", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221104-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769", "reference_id": "show_bug.cgi?id=28769", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050173?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u5" } ], "aliases": [ "CVE-2021-3999" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58069?format=api", "vulnerability_id": "VCID-6t8d-48g7-1yey", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05694", "scoring_system": "epss", "scoring_elements": "0.90423", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05694", "scoring_system": "epss", "scoring_elements": "0.90421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92901", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92909", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92918", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92927", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92914", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09682", "scoring_system": "epss", "scoring_elements": "0.92897", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17905" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/82244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/82244" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300312", "reference_id": "1300312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300312" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455", "reference_id": "812455", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8779", "reference_id": "CVE-2015-8779", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8779" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8779" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t8d-48g7-1yey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61415?format=api", "vulnerability_id": "VCID-75dc-1fd5-u3e2", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9169", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0708", "scoring_system": "epss", "scoring_elements": "0.91536", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0708", "scoring_system": "epss", "scoring_elements": "0.91541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94238", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.9425", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94268", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9" }, { "reference_url": "https://support.f5.com/csp/article/K54823184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K54823184" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "http://www.securityfocus.com/bid/107160", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107160" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684057", "reference_id": "1684057", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684057" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612", "reference_id": "924612", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612" }, { "reference_url": "https://security.archlinux.org/ASA-201911-3", "reference_id": "ASA-201911-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-3" }, { "reference_url": "https://security.archlinux.org/AVG-855", "reference_id": "AVG-855", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-855" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9169", "reference_id": "CVE-2019-9169", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9169" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049937?format=api", "purl": "pkg:deb/debian/glibc@2.28-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-10" } ], "aliases": [ "CVE-2019-9169" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75dc-1fd5-u3e2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61187?format=api", "vulnerability_id": "VCID-7fvy-59bc-jqf6", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1234", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79408", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79487", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79456", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79484", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79425", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79461", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79483", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01266", "scoring_system": "epss", "scoring_elements": "0.79466", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1234" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2021/Sep/0" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19779" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/07/16", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/03/07/16" }, { "reference_url": "http://www.securityfocus.com/bid/84204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84204" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315647", "reference_id": "1315647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315647" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1234", "reference_id": "CVE-2016-1234", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1234" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-1234" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fvy-59bc-jqf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85197?format=api", "vulnerability_id": "VCID-814q-u5m5-gqec", "summary": "glibc: stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458)", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85303", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85307", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85213", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85225", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85246", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85291", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02478", "scoring_system": "epss", "scoring_elements": "0.85285", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://source.android.com/security/bulletin/2017-12-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-12-01" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20010" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039" }, { "reference_url": "http://www.securityfocus.com/bid/102073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102073" }, { "reference_url": "http://www.securityfocus.com/bid/88440", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/88440" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330887", "reference_id": "1330887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330887" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3706", "reference_id": "CVE-2016-3706", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3706" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-3706" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-814q-u5m5-gqec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85132?format=api", "vulnerability_id": "VCID-84zb-rzwk-fbfp", "summary": "glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.8358", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83682", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83646", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83681", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83633", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83641", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01997", "scoring_system": "epss", "scoring_elements": "0.83658", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html" }, { "reference_url": "https://source.android.com/security/bulletin/2017-12-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-12-01" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20112" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039" }, { "reference_url": "http://www.securityfocus.com/bid/102073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102073" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337136", "reference_id": "1337136", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337136" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347", "reference_id": "840347", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4429", "reference_id": "CVE-2016-4429", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4429" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" }, { "reference_url": "https://usn.ubuntu.com/3759-1/", "reference_id": "USN-3759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3759-1/" }, { "reference_url": "https://usn.ubuntu.com/3759-2/", "reference_id": "USN-3759-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3759-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-4429" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-84zb-rzwk-fbfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83798?format=api", "vulnerability_id": "VCID-8egr-f63v-3uht", "summary": "glibc: Buffer overflow triggerable via LD_LIBRARY_PATH", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000409", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00841", "scoring_system": "epss", "scoring_elements": "0.74681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.7541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75419", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75406", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75447", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75454", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75443", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000409" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522830", "reference_id": "1522830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522830" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133", "reference_id": "884133", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000409" ], "risk_score": 8.4, "exploitability": "2.0", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8egr-f63v-3uht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43780?format=api", "vulnerability_id": "VCID-8p27-z2tz-4bbm", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30847", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30818", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30873", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30852", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30973", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30927", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30842", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408", "reference_id": "1965408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147", "reference_id": "989147", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2021-33574" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58062?format=api", "vulnerability_id": "VCID-991k-es3s-hbg4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86487", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86497", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86516", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86515", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86545", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.8656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86564", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02992", "scoring_system": "epss", "scoring_elements": "0.86562", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165192", "reference_id": "1165192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165192" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587", "reference_id": "779587", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0327", "reference_id": "RHSA-2015:0327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0327" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2014-8121" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-991k-es3s-hbg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59737?format=api", "vulnerability_id": "VCID-b6tp-a1qc-pfdw", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6096", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8318", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8324", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8321", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83208", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89128", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6096" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25620", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" }, { "reference_url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820331", "reference_id": "1820331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820331" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452", "reference_id": "961452", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6096", "reference_id": "CVE-2020-6096", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://usn.ubuntu.com/4954-1/", "reference_id": "USN-4954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4954-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-6096" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b6tp-a1qc-pfdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=api", "vulnerability_id": "VCID-bcuy-bbxf-x7hy", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45229", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45231", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54576", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204", "reference_id": "2277204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006", "reference_id": "GLIBC-SA-2024-0006", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0013/", "reference_id": "ntap-20240524-0013", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33600" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=api", "vulnerability_id": "VCID-bsue-bznw-1ffe", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28523", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28476", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28387", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28379", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34852", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205", "reference_id": "2277205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007", "reference_id": "GLIBC-SA-2024-0007", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0014/", "reference_id": "ntap-20240524-0014", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0014/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33601" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61414?format=api", "vulnerability_id": "VCID-c4w6-89qu-xkev", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-7309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.3775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.4428", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44303", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44351", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-7309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24155" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html" }, { "reference_url": "http://www.securityfocus.com/bid/106835", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106835" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672232", "reference_id": "1672232", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672232" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7309", "reference_id": "CVE-2019-7309", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7309" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2019-7309" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4w6-89qu-xkev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31487?format=api", "vulnerability_id": "VCID-cv87-rxmr-cqhn", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45897", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45908", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45928", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45952", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.6081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60839", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22325" }, { "reference_url": "http://www.securityfocus.com/bid/101517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101517" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504806", "reference_id": "1504806", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500", "reference_id": "879500", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500" }, { "reference_url": "https://security.archlinux.org/ASA-201801-8", "reference_id": "ASA-201801-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-8" }, { "reference_url": "https://security.archlinux.org/ASA-201801-9", "reference_id": "ASA-201801-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-9" }, { "reference_url": "https://security.archlinux.org/AVG-460", "reference_id": "AVG-460", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671", "reference_id": "CVE-2017-15671", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15671" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cv87-rxmr-cqhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58067?format=api", "vulnerability_id": "VCID-d1zs-8tg7-byhe", "summary": "security update", "references": [ { "reference_url": "http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18743", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18733", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18745", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18695", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18654", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21072", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18928" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/81469", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81469" }, { "reference_url": "http://www.securitytracker.com/id/1034811", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034811" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260581", "reference_id": "1260581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260581" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316", "reference_id": "798316", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8777", "reference_id": "CVE-2015-8777", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8777" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8777" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d1zs-8tg7-byhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43044?format=api", "vulnerability_id": "VCID-d5xx-af6p-2fhn", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13181", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13129", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13249", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468", "reference_id": "2367468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468" }, { "reference_url": "https://security.gentoo.org/glsa/202509-04", "reference_id": "GLSA-202509-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-04" }, { "reference_url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e", "reference_id": "?id=1e18586c5820e329f741d5c710275e165581380e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/" } ], "url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10219", "reference_id": "RHSA-2025:10219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10220", "reference_id": "RHSA-2025:10220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10294", "reference_id": "RHSA-2025:10294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11487", "reference_id": "RHSA-2025:11487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8655", "reference_id": "RHSA-2025:8655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8686", "reference_id": "RHSA-2025:8686", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8686" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9028", "reference_id": "RHSA-2025:9028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9336", "reference_id": "RHSA-2025:9336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9725", "reference_id": "RHSA-2025:9725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9750", "reference_id": "RHSA-2025:9750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9750" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976", "reference_id": "show_bug.cgi?id=32976", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976" }, { "reference_url": "https://usn.ubuntu.com/7541-1/", "reference_id": "USN-7541-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7541-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api", "purl": "pkg:deb/debian/glibc@2.36-8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8" } ], "aliases": [ "CVE-2025-4802" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43779?format=api", "vulnerability_id": "VCID-dqgn-fdxt-u3cc", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38447", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38548", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38527", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38494", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38554", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916", "reference_id": "1921916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/01/28/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2021/01/28/2" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198", "reference_id": "981198", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210304-0007/", "reference_id": "ntap-20210304-0007", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210304-0007/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256", "reference_id": "show_bug.cgi?id=27256", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5699-1/", "reference_id": "USN-5699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5699-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api", "purl": "pkg:deb/debian/glibc@2.31-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11" } ], "aliases": [ "CVE-2021-3326" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqgn-fdxt-u3cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83686?format=api", "vulnerability_id": "VCID-e27x-ufvw-cyec", "summary": "glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11236", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76603", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76537", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.7652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76568", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11236" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.securityfocus.com/bid/104255", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104255" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581269", "reference_id": "1581269", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581269" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071", "reference_id": "899071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11236", "reference_id": "CVE-2018-11236", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-11236" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e27x-ufvw-cyec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39605?format=api", "vulnerability_id": "VCID-edpa-k13r-uken", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.7833", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78313", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78375", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78372", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383297", "reference_id": "1383297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383297" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752", "reference_id": "834752", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036928?format=api", "purl": "pkg:deb/debian/glibc@2.24-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-10" } ], "aliases": [ "CVE-2016-6323" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edpa-k13r-uken" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82700?format=api", "vulnerability_id": "VCID-evbv-ckb4-yybq", "summary": "glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80034", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80113", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80083", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80112", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80062", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80079", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80091", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=11053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672" }, { "reference_url": "https://support.f5.com/csp/article/K64119434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K64119434" }, { "reference_url": "https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683683", "reference_id": "1683683", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683683" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613", "reference_id": "924613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5155", "reference_id": "CVE-2009-5155", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5155" }, { "reference_url": "https://usn.ubuntu.com/4954-1/", "reference_id": "USN-4954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4954-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2009-5155" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evbv-ckb4-yybq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61188?format=api", "vulnerability_id": "VCID-f7vd-cpza-xfcx", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2573.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2573.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93413", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93382", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93378", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10879", "scoring_system": "epss", "scoring_elements": "0.93383", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19879" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4" }, { "reference_url": "http://www.securityfocus.com/bid/85732", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/85732" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321866", "reference_id": "1321866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321866" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3075", "reference_id": "CVE-2016-3075", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3075" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2573", "reference_id": "RHSA-2016:2573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2573" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-3075" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f7vd-cpza-xfcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83797?format=api", "vulnerability_id": "VCID-f9ts-xn57-6qa8", "summary": "glibc: Memory leak reachable via LD_HWCAP_MASK", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73386", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73409", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73418", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.7347", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73472", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522828", "reference_id": "1522828", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522828" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132", "reference_id": "884132", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt", "reference_id": "CVE-2017-1000409;CVE-2017-1000408", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000408" ], "risk_score": 6.0, "exploitability": "2.0", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ts-xn57-6qa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85784?format=api", "vulnerability_id": "VCID-fjrd-sadn-kfcf", "summary": "glibc: potential denial of service in internal_fnmatch()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8984", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73298", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73305", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73203", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73234", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73207", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73281", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73254", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73297", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18032" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/02/26/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/02/26/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/72789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197730", "reference_id": "1197730", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197730" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587", "reference_id": "779587", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8984", "reference_id": "CVE-2015-8984", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8984" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8984" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjrd-sadn-kfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62166?format=api", "vulnerability_id": "VCID-ge24-a7a4-d3bn", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78075", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78154", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78123", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81723", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.8172", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975", "reference_id": "1977975", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542", "reference_id": "990542", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210827-0005/", "reference_id": "ntap-20210827-0005", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210827-0005/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" }, { "reference_url": "https://sourceware.org/glibc/wiki/Security%20Exceptions", "reference_id": "Security%20Exceptions", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/glibc/wiki/Security%20Exceptions" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011", "reference_id": "show_bug.cgi?id=28011", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5699-1/", "reference_id": "USN-5699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5699-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050170?format=api", "purl": "pkg:deb/debian/glibc@2.31-13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13" } ], "aliases": [ "CVE-2021-35942" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34316?format=api", "vulnerability_id": "VCID-gv4u-g36a-w3cf", "summary": "Multiple vulnerabilities in glibc could result in Local Privilege Escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.59128", "scoring_system": "epss", "scoring_elements": "0.9822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.59128", "scoring_system": "epss", "scoring_elements": "0.98223", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.67392", "scoring_system": "epss", "scoring_elements": "0.98574", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.72535", "scoring_system": "epss", "scoring_elements": "0.98763", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.72771", "scoring_system": "epss", "scoring_elements": "0.98771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.9884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98837", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98845", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352", "reference_id": "2238352", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8" }, { "reference_url": "https://www.qualys.com/cve-2023-4911/", "reference_id": "cve-2023-4911", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://www.qualys.com/cve-2023-4911/" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4911", "reference_id": "CVE-2023-4911", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-4911" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt", "reference_id": "CVE-2023-4911", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt" }, { "reference_url": "https://security.gentoo.org/glsa/202310-03", "reference_id": "GLSA-202310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202310-03" }, { "reference_url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "reference_id": "looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5453", "reference_id": "RHSA-2023:5453", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5454", "reference_id": "RHSA-2023:5454", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5455", "reference_id": "RHSA-2023:5455", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5476", "reference_id": "RHSA-2023:5476", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0033", "reference_id": "RHSA-2024:0033", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0033" }, { "reference_url": "https://usn.ubuntu.com/6409-1/", "reference_id": "USN-6409-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6409-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2023-4911" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31488?format=api", "vulnerability_id": "VCID-hdz6-ewkg-xqc9", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43014", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43061", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43077", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43137", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43072", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.431", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43092", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43104", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22332" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8" }, { "reference_url": "http://www.securityfocus.com/bid/101535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505298", "reference_id": "1505298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505298" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955", "reference_id": "879955", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804", "reference_id": "CVE-2017-15804", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1879", "reference_id": "RHSA-2018:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1879" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15804" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz6-ewkg-xqc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59735?format=api", "vulnerability_id": "VCID-hj77-4nfx-fuaa", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16186", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16169", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16319", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16301", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16131", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16149", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905217", "reference_id": "1905217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905217" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391", "reference_id": "976391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210122-0004/", "reference_id": "ntap-20210122-0004", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210122-0004/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26923", "reference_id": "show_bug.cgi?id=26923", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26923" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/", "reference_id": "TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-29562" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hj77-4nfx-fuaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59736?format=api", "vulnerability_id": "VCID-hrky-wxm3-5fh3", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36892", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36902", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36979", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37061", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37094", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36922", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36973", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36995", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.3696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36934", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905213", "reference_id": "1905213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905213" }, { "reference_url": "https://security.archlinux.org/AVG-1324", "reference_id": "AVG-1324", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1324" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2813", "reference_id": "RHSA-2021:2813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2998", "reference_id": "RHSA-2021:2998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3315", "reference_id": "RHSA-2021:3315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3315" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2020-29573" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrky-wxm3-5fh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84601?format=api", "vulnerability_id": "VCID-jadt-55f6-uuh6", "summary": "glibc: Use-after-free read access in clntudp_call in sunrpc", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64777", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.6479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64744", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64749", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64769", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478288", "reference_id": "1478288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478288" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648", "reference_id": "870648", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648" }, { "reference_url": "https://security.archlinux.org/AVG-368", "reference_id": "AVG-368", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-368" }, { "reference_url": "https://security.archlinux.org/AVG-369", "reference_id": "AVG-369", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-369" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-12133" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jadt-55f6-uuh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85196?format=api", "vulnerability_id": "VCID-jnz7-w98a-kqgs", "summary": "glibc: getaddrinfo should reject IP addresses with trailing characters", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06387", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12189", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12192", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12297", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1233", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" }, { "reference_url": "http://www.securityfocus.com/bid/106672", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106672" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549", "reference_id": "1347549", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047", "reference_id": "920047", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047" }, { "reference_url": "https://security.archlinux.org/AVG-1984", "reference_id": "AVG-1984", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1984" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739", "reference_id": "CVE-2016-10739", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2118", "reference_id": "RHSA-2019:2118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3513", "reference_id": "RHSA-2019:3513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3513" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2016-10739" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnz7-w98a-kqgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61770?format=api", "vulnerability_id": "VCID-kpcn-f4dw-97hm", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21653", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21651", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21874", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21703", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21732", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21683", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544", "reference_id": "717544", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408", "reference_id": "976408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2013-2207" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83763?format=api", "vulnerability_id": "VCID-kxg9-kntn-xqan", "summary": "glibc: memory corruption in memcpy-sse2-unaligned.S", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18269", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78068", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78152", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78158", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.7812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78146", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/fingolfin/memmove-bug", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/fingolfin/memmove-bug" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22644" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580924", "reference_id": "1580924", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580924" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18269", "reference_id": "CVE-2017-18269", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18269" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-18269" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kxg9-kntn-xqan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61416?format=api", "vulnerability_id": "VCID-mqch-gxfq-zyhh", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12802", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.129", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15601", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670", "reference_id": "1810670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108", "reference_id": "953108", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2998", "reference_id": "RHSA-2021:2998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3315", "reference_id": "RHSA-2021:3315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3315" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-10029" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqch-gxfq-zyhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92882?format=api", "vulnerability_id": "VCID-nj37-pefw-rfbt", "summary": "pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.", "references": [ { "reference_url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403" }, { "reference_url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958" }, { "reference_url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71703", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71617", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71623", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71641", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71654", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71688", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71672", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71653", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71697", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/02/23/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/07/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/03/07/2" }, { "reference_url": "http://www.securityfocus.com/bid/84601", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84601" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt", "reference_id": "CVE-2016-2856", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2856", "reference_id": "CVE-2016-2856", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2856" }, { "reference_url": "http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/", "reference_id": "CVE-2016-2856", "reference_type": "exploit", "scores": [], "url": "http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-2856" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nj37-pefw-rfbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79939?format=api", "vulnerability_id": "VCID-nk5x-uhcf-7kan", "summary": "glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69399", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69418", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69398", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69407", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652", "reference_id": "2020652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622", "reference_id": "998622", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2021-43396" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58063?format=api", "vulnerability_id": "VCID-ppaj-d4b9-wuhf", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91643", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91657", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.9167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.9168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91692", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07304", "scoring_system": "epss", "scoring_elements": "0.91693", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199525", "reference_id": "1199525", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105", "reference_id": "796105", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0863", "reference_id": "RHSA-2015:0863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2199", "reference_id": "RHSA-2015:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-1781" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ppaj-d4b9-wuhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61417?format=api", "vulnerability_id": "VCID-pyms-pya1-buck", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33535", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33687", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33601", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33599", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47732", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810719", "reference_id": "1810719", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810719" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-1751" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyms-pya1-buck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84471?format=api", "vulnerability_id": "VCID-q5az-xe7k-m7av", "summary": "glibc: Fragmentation attacks possible when EDNS0 is enabled", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52657", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52786", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52795", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52702", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52745", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5274", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5279", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52774", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52758", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477529", "reference_id": "1477529", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477529" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650", "reference_id": "870650", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650" }, { "reference_url": "https://security.archlinux.org/AVG-368", "reference_id": "AVG-368", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-368" }, { "reference_url": "https://security.archlinux.org/AVG-369", "reference_id": "AVG-369", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-369" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-12132" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5az-xe7k-m7av" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31491?format=api", "vulnerability_id": "VCID-qaaq-fss4-1kgr", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.7801", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78027", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78019", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542102", "reference_id": "1542102", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542102" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159", "reference_id": "878159", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4218-1/", "reference_id": "USN-4218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4218-1/" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-6485" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qaaq-fss4-1kgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31492?format=api", "vulnerability_id": "VCID-qwx5-bayb-bkcg", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542119", "reference_id": "1542119", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542119" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-6551" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwx5-bayb-bkcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58064?format=api", "vulnerability_id": "VCID-r44h-gkxy-8kh2", "summary": "security update", "references": [ { "reference_url": "http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145596041017029&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145596041017029&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145672440608228&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145672440608228&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145690841819314&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145690841819314&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=145857691004892&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=145857691004892&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=146161017210491&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=146161017210491&w=2" }, { "reference_url": "http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html" }, { "reference_url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0175.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0175.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0176.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0176.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0225.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0225.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0277.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0277.html" }, { "reference_url": "https://access.redhat.com/articles/2161461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/articles/2161461" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93908", "scoring_system": "epss", "scoring_elements": "0.99875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.93908", "scoring_system": "epss", "scoring_elements": "0.99874", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99883", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99884", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.93952", "scoring_system": "epss", "scoring_elements": "0.99882", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7547" }, { "reference_url": "https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/" }, { "reference_url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/" }, { "reference_url": "https://bto.bluecoat.com/security-advisory/sa114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bto.bluecoat.com/security-advisory/sa114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2021/Sep/0" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/Jun/36", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2022/Jun/36" }, { "reference_url": "https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917" }, { "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722" }, { "reference_url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "reference_id": "", "reference_type": "", "scores": [], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "reference_url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10150" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160217-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20160217-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18665" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html" }, { "reference_url": "https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html" }, { "reference_url": "https://support.lenovo.com/us/en/product_security/len_5450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.lenovo.com/us/en/product_security/len_5450" }, { "reference_url": "http://support.citrix.com/article/CTX206991", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.citrix.com/article/CTX206991" }, { "reference_url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17" }, { "reference_url": "https://www.exploit-db.com/exploits/39454/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/39454/" }, { "reference_url": "https://www.exploit-db.com/exploits/40339/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/40339/" }, { "reference_url": "https://www.kb.cert.org/vuls/id/457759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kb.cert.org/vuls/id/457759" }, { "reference_url": "https://www.tenable.com/security/research/tra-2017-08", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/research/tra-2017-08" }, { "reference_url": "http://ubuntu.com/usn/usn-2900-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-2900-1" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow" }, { "reference_url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/83265", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83265" }, { "reference_url": "http://www.securitytracker.com/id/1035020", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035020" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2016-0002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0002.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293532", "reference_id": "1293532", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293532" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py" }, { "reference_url": "https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" }, { "reference_url": "https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html", "reference_id": "CVE-2015-7547", "reference_type": "exploit", "scores": [], "url": "https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7547", "reference_id": "CVE-2015-7547", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7547" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0175", "reference_id": "RHSA-2016:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0176", "reference_id": "RHSA-2016:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0225", "reference_id": "RHSA-2016:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0225" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0277", "reference_id": "RHSA-2016:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0277" }, { "reference_url": "https://usn.ubuntu.com/2900-1/", "reference_id": "USN-2900-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2900-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-7547" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r44h-gkxy-8kh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39606?format=api", "vulnerability_id": "VCID-rqh3-5xc2-uyab", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000366", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91821", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91875", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91865", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91866", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91881", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91877", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91862", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543", "reference_id": "1452543", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543" }, { "reference_url": "https://security.archlinux.org/ASA-201706-22", "reference_id": "ASA-201706-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-22" }, { "reference_url": "https://security.archlinux.org/ASA-201706-23", "reference_id": "ASA-201706-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-23" }, { "reference_url": "https://security.archlinux.org/AVG-307", "reference_id": "AVG-307", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-307" }, { "reference_url": "https://security.archlinux.org/AVG-308", "reference_id": "AVG-308", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-308" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c", "reference_id": "CVE-2017-1000370;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c", "reference_id": "CVE-2017-1000370;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c", "reference_id": "CVE-2017-1000371;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c", "reference_id": "CVE-2017-1000371;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c", "reference_id": "CVE-2017-1000379;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c", "reference_id": "CVE-2017-1000379;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1479", "reference_id": "RHSA-2017:1479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1480", "reference_id": "RHSA-2017:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1481", "reference_id": "RHSA-2017:1481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1567", "reference_id": "RHSA-2017:1567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1567" }, { "reference_url": "https://usn.ubuntu.com/3323-1/", "reference_id": "USN-3323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3323-1/" }, { "reference_url": "https://usn.ubuntu.com/3323-2/", "reference_id": "USN-3323-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3323-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036033?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u10" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036929?format=api", "purl": "pkg:deb/debian/glibc@2.24-11%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-11%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000366" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqh3-5xc2-uyab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61413?format=api", "vulnerability_id": "VCID-rt4z-2rd4-qfde", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6488", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35489", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35505", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35514", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35449", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24097" }, { "reference_url": "http://www.securityfocus.com/bid/106671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106671" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667931", "reference_id": "1667931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667931" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6488", "reference_id": "CVE-2019-6488", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6488" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2019-6488" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rt4z-2rd4-qfde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58066?format=api", "vulnerability_id": "VCID-ru1q-qgq2-h7ct", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05306", "scoring_system": "epss", "scoring_elements": "0.90041", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05306", "scoring_system": "epss", "scoring_elements": "0.90044", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.9171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91735", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91747", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07412", "scoring_system": "epss", "scoring_elements": "0.91764", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18985" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/83277", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83277" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300299", "reference_id": "1300299", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300299" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445", "reference_id": "812445", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8776", "reference_id": "CVE-2015-8776", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P" }, { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8776" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8776" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ru1q-qgq2-h7ct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43776?format=api", "vulnerability_id": "VCID-sbzq-gp2e-v7fy", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25013", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.7417", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74088", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.7409", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74179", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74171", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74133", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74157", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74121", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960", "reference_id": "1912960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/", "reference_id": "4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273", "reference_id": "979273", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210205-0004/", "reference_id": "ntap-20210205-0004", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210205-0004/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b" }, { "reference_url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E", "reference_id": "r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E", "reference_id": "r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E", "reference_id": "r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E", "reference_id": "r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E", "reference_id": "r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E", "reference_id": "r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E", "reference_id": "r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E", "reference_id": "rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24973", "reference_id": "show_bug.cgi?id=24973", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/", "reference_id": "TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2019-25013" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sbzq-gp2e-v7fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=api", "vulnerability_id": "VCID-sjav-8bub-eycz", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.91755", "scoring_system": "epss", "scoring_elements": "0.99689", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.9971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99712", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.92578", "scoring_system": "epss", "scoring_elements": "0.99739", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191", "reference_id": "1069191", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/24/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/24/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404", "reference_id": "2273404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/18/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/17/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/17/9" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/", "reference_id": "BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004", "reference_id": "GLIBC-SA-2024-0004", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0002/", "reference_id": "ntap-20240531-0002", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240531-0002/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/", "reference_id": "P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2722", "reference_id": "RHSA-2024:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3269", "reference_id": "RHSA-2024:3269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7590", "reference_id": "RHSA-2024:7590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7594", "reference_id": "RHSA-2024:7594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7599", "reference_id": "RHSA-2024:7599", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7939", "reference_id": "RHSA-2024:7939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8235", "reference_id": "RHSA-2024:8235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8235" }, { "reference_url": "https://usn.ubuntu.com/6737-1/", "reference_id": "USN-6737-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6737-1/" }, { "reference_url": "https://usn.ubuntu.com/6737-2/", "reference_id": "USN-6737-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6737-2/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/", "reference_id": "YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-2961" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85787?format=api", "vulnerability_id": "VCID-tp9v-vmge-nkdf", "summary": "glibc: _IO_wstr_overflow integer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8983", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.6702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67025", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67039", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66956", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66981", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67005", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67037", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67022", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66992", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17269" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/72740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72740" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195762", "reference_id": "1195762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195762" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587", "reference_id": "779587", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8983", "reference_id": "CVE-2015-8983", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8983" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8983" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tp9v-vmge-nkdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83453?format=api", "vulnerability_id": "VCID-uqdb-tx7y-bbbc", "summary": "glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73959", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74047", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74055", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.7401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196" }, { "reference_url": "https://www.exploit-db.com/exploits/44750/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44750/" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.securityfocus.com/bid/104256", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104256" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581274", "reference_id": "1581274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581274" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070", "reference_id": "899070", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11237", "reference_id": "CVE-2018-11237", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-11237" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqdb-tx7y-bbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36350?format=api", "vulnerability_id": "VCID-utss-75dn-r3b7", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41883", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41953", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41945", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41972", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41931", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8985" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/76916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/76916" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197798", "reference_id": "1197798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197798" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8985", "reference_id": "CVE-2015-8985", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8985" }, { "reference_url": "https://security.gentoo.org/glsa/201908-06", "reference_id": "GLSA-201908-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2015-8985" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utss-75dn-r3b7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59733?format=api", "vulnerability_id": "VCID-v96m-se3g-8ydp", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61384", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61538", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.6155", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61461", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61489", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61543", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61529", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61509", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428290", "reference_id": "1428290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428290" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503", "reference_id": "856503", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2016-10228" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v96m-se3g-8ydp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36352?format=api", "vulnerability_id": "VCID-vajf-thpr-pbat", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80134", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80141", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80186", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.8015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82677", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82673", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.8271", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82711", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591" }, { "reference_url": "http://www.securitytracker.com/id/1042174", "reference_id": "1042174", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "http://www.securitytracker.com/id/1042174" }, { "reference_url": "http://www.securityfocus.com/bid/106037", "reference_id": "106037", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "http://www.securityfocus.com/bid/106037" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653993", "reference_id": "1653993", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653993" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837", "reference_id": "914837", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837" }, { "reference_url": "https://security.archlinux.org/AVG-830", "reference_id": "AVG-830", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-830" }, { "reference_url": "https://security.archlinux.org/AVG-831", "reference_id": "AVG-831", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-831" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/", "reference_id": "BO7WHN52GFMC5F2I2232GFIPSSXWFV7G", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408", "reference_id": "gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408" }, { "reference_url": "https://security.gentoo.org/glsa/201903-09", "reference_id": "GLSA-201903-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.gentoo.org/glsa/201903-09" }, { "reference_url": "https://security.gentoo.org/glsa/201908-06", "reference_id": "GLSA-201908-06", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.gentoo.org/glsa/201908-06" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/", "reference_id": "M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190321-0003/", "reference_id": "ntap-20190321-0003", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20190321-0003/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD", "reference_id": "?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23927", "reference_id": "show_bug.cgi?id=23927", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23927" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-19591" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vajf-thpr-pbat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39601?format=api", "vulnerability_id": "VCID-vake-u1n1-x3hx", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.6116", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61318", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.6124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61269", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72878", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72876", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249603", "reference_id": "1249603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249603" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106", "reference_id": "796106", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036928?format=api", "purl": "pkg:deb/debian/glibc@2.24-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-10" } ], "aliases": [ "CVE-2015-5180" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vake-u1n1-x3hx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61186?format=api", "vulnerability_id": "VCID-ven5-emb5-a7bh", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which allows context-dependent attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2172.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2172.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27908", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28039", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28065", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28022", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27974", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27957", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17079" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/78092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/78092" }, { "reference_url": "http://www.securitytracker.com/id/1034196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034196" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262914", "reference_id": "1262914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262914" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966", "reference_id": "799966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5277", "reference_id": "CVE-2015-5277", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5277" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2172", "reference_id": "RHSA-2015:2172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-5277" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ven5-emb5-a7bh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59734?format=api", "vulnerability_id": "VCID-vqyv-kf5w-vkch", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1752", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40442", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40469", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40515", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40495", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40543", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40511", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810718", "reference_id": "1810718", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810718" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788", "reference_id": "953788", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-1752" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyv-kf5w-vkch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31486?format=api", "vulnerability_id": "VCID-wctr-ebf2-gqa1", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44273", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4432", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44302", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44354", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22320" }, { "reference_url": "http://www.securityfocus.com/bid/101521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101521" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504804", "reference_id": "1504804", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504804" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501", "reference_id": "879501", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501" }, { "reference_url": "https://security.archlinux.org/ASA-201801-8", "reference_id": "ASA-201801-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-8" }, { "reference_url": "https://security.archlinux.org/ASA-201801-9", "reference_id": "ASA-201801-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-9" }, { "reference_url": "https://security.archlinux.org/AVG-460", "reference_id": "AVG-460", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670", "reference_id": "CVE-2017-15670", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1879", "reference_id": "RHSA-2018:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1879" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15670" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wctr-ebf2-gqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58068?format=api", "vulnerability_id": "VCID-weg2-kxcj-fkcg", "summary": "security update", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06102", "scoring_system": "epss", "scoring_elements": "0.90802", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92974", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92949", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.9296", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92965", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09807", "scoring_system": "epss", "scoring_elements": "0.92963", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18240" }, { "reference_url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3480" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3481" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/20/1" }, { "reference_url": "http://www.securityfocus.com/bid/83275", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83275" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2985-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2985-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300303", "reference_id": "1300303", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300303" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441", "reference_id": "812441", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8778", "reference_id": "CVE-2015-8778", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8778" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://security.gentoo.org/glsa/201702-11", "reference_id": "GLSA-201702-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0680", "reference_id": "RHSA-2017:0680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1916", "reference_id": "RHSA-2017:1916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1916" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036030?format=api", "purl": "pkg:deb/debian/glibc@2.19-18%2Bdeb8u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-18%252Bdeb8u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8778" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-weg2-kxcj-fkcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31489?format=api", "vulnerability_id": "VCID-wp12-z5a5-pbgd", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75266", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75358", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.7527", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.7528", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75334", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75355", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16997" }, { "reference_url": "https://bugs.debian.org/884615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/884615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22625" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html" }, { "reference_url": "http://www.securityfocus.com/bid/102228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102228" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526865", "reference_id": "1526865", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526865" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615", "reference_id": "884615", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997", "reference_id": "CVE-2017-16997", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-16997" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp12-z5a5-pbgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62169?format=api", "vulnerability_id": "VCID-wp18-zqr6-a3ag", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.5946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66912", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017", "reference_id": "2042017", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542", "reference_id": "show_bug.cgi?id=22542", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2022-23219" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp18-zqr6-a3ag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31490?format=api", "vulnerability_id": "VCID-ww2m-6691-yfa7", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.974", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97409", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97412", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.9739", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97396", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97399", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97524", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97518", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533836", "reference_id": "1533836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001", "reference_id": "887001", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001" }, { "reference_url": "https://security.archlinux.org/ASA-201801-18", "reference_id": "ASA-201801-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-18" }, { "reference_url": "https://security.archlinux.org/ASA-201801-19", "reference_id": "ASA-201801-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-19" }, { "reference_url": "https://security.archlinux.org/AVG-590", "reference_id": "AVG-590", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-590" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb" }, { "reference_url": "https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" }, { "reference_url": "https://usn.ubuntu.com/3536-1/", "reference_id": "USN-3536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3536-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-4768-1/", "reference_id": "USN-USN-4768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-1000001" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ww2m-6691-yfa7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=api", "vulnerability_id": "VCID-xhcm-t8jb-ybfb", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63661", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63676", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.6366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63673", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00627", "scoring_system": "epss", "scoring_elements": "0.70258", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206", "reference_id": "2277206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008", "reference_id": "GLIBC-SA-2024-0008", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0012/", "reference_id": "ntap-20240524-0012", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0012/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33602" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85805?format=api", "vulnerability_id": "VCID-xyvn-w5ac-yqcn", "summary": "glibc: multiple overflows in strxfrm()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79827", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79823", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79824", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79746", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79754", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79761", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.7979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79797", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79819", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0131", "scoring_system": "epss", "scoring_elements": "0.79795", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=16009" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/02/13/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/02/13/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/72602", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72602" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192525", "reference_id": "1192525", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927", "reference_id": "803927", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8982", "reference_id": "CVE-2015-8982", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8982" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-8982" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyvn-w5ac-yqcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61864?format=api", "vulnerability_id": "VCID-ys5d-7xgp-w7g5", "summary": "A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21685", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21899", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21664", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21798", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21808", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21768", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21718", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html", "reference_id": "000044.html", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460", "reference_id": "2339460", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2025/01/22/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2025/01/22/4" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001", "reference_id": "GLIBC-SA-2025-0001", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001" }, { "reference_url": "https://security.gentoo.org/glsa/202505-06", "reference_id": "GLSA-202505-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3828", "reference_id": "RHSA-2025:3828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4241", "reference_id": "RHSA-2025:4241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4242", "reference_id": "RHSA-2025:4242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4243", "reference_id": "RHSA-2025:4243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4244", "reference_id": "RHSA-2025:4244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4244" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582", "reference_id": "show_bug.cgi?id=32582", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582" }, { "reference_url": "https://usn.ubuntu.com/7259-1/", "reference_id": "USN-7259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-1/" }, { "reference_url": "https://usn.ubuntu.com/7259-2/", "reference_id": "USN-7259-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-2/" }, { "reference_url": "https://usn.ubuntu.com/7259-3/", "reference_id": "USN-7259-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api", "purl": "pkg:deb/debian/glibc@2.36-8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8" } ], "aliases": [ "CVE-2025-0395" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84958?format=api", "vulnerability_id": "VCID-z2xd-8n4a-b3cp", "summary": "glibc: per-thread memory leak in __res_vinit with IPv6 nameservers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78734", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.7878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78813", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.7881", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01185", "scoring_system": "epss", "scoring_elements": "0.78808", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362534", "reference_id": "1362534", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362534" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302", "reference_id": "833302", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2016-5417" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z2xd-8n4a-b3cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78322?format=api", "vulnerability_id": "VCID-zk4w-q3pr-myh6", "summary": "glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with \"**(!()\" pattern", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-20109", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08329", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08384", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08429", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08359", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08419", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09051", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-20109" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217330", "reference_id": "2217330", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217330" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230731-0009/", "reference_id": "ntap-20230731-0009", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230731-0009/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18036", "reference_id": "show_bug.cgi?id=18036", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18036" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036927?format=api", "purl": "pkg:deb/debian/glibc@2.23-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-4" } ], "aliases": [ "CVE-2015-20109" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zk4w-q3pr-myh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43778?format=api", "vulnerability_id": "VCID-zqx5-4rdk-1qa3", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11232", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11242", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11048", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11057", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589", "reference_id": "1932589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/", "reference_id": "7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479", "reference_id": "983479", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/", "reference_id": "I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462", "reference_id": "show_bug.cgi?id=27462", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api", "purl": "pkg:deb/debian/glibc@2.31-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11" } ], "aliases": [ "CVE-2021-27645" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84247?format=api", "vulnerability_id": "VCID-4nf7-929x-4bb1", "summary": "glibc: nscd buffer manipulation vulnerability could lead to code execution or crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9984", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65872", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65984", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65996", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65943", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65973", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65948", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463288", "reference_id": "1463288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463288" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2014-9984" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nf7-929x-4bb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54364?format=api", "vulnerability_id": "VCID-5g37-r914-r3g8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.6359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63554", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63606", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63622", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63634", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63617", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209105", "reference_id": "1209105", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209105" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197", "reference_id": "777197", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2199", "reference_id": "RHSA-2015:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2519-1/", "reference_id": "USN-2519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2519-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2015-1473" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5g37-r914-r3g8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54362?format=api", "vulnerability_id": "VCID-aapy-xr76-zbc4", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92444", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92459", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92485", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92486", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92496", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.087", "scoring_system": "epss", "scoring_elements": "0.92499", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175369", "reference_id": "1175369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175369" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572", "reference_id": "775572", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/2519-1/", "reference_id": "USN-2519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2519-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2014-9402" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aapy-xr76-zbc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54363?format=api", "vulnerability_id": "VCID-aq6k-yr6s-4ygw", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89413", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89424", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89442", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89445", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89463", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04758", "scoring_system": "epss", "scoring_elements": "0.89461", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188235", "reference_id": "1188235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188235" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197", "reference_id": "777197", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2199", "reference_id": "RHSA-2015:2199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2589", "reference_id": "RHSA-2015:2589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2589" }, { "reference_url": "https://usn.ubuntu.com/2519-1/", "reference_id": "USN-2519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2519-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2015-1472" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aq6k-yr6s-4ygw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54359?format=api", "vulnerability_id": "VCID-hkyd-8rrg-v3e7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75142", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75188", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75219", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75208", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888", "reference_id": "681888", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943", "reference_id": "826943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1097", "reference_id": "RHSA-2012:1097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098", "reference_id": "RHSA-2012:1098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200", "reference_id": "RHSA-2012:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1200" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2012-3406" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54414?format=api", "vulnerability_id": "VCID-ywmm-hzmg-z3b4", "summary": "security update", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2015-0016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0016.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2015-0092.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0092.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-2023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-2023.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36566", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.3663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36621", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36596", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36642", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36625", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" }, { "reference_url": "http://seclists.org/oss-sec/2014/q4/730", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/oss-sec/2014/q4/730" }, { "reference_url": "http://secunia.com/advisories/62100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62100" }, { "reference_url": "http://secunia.com/advisories/62146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62146" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98852" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17625" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3142" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "reference_url": "http://www.securityfocus.com/bid/71216", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71216" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2432-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2432-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157689", "reference_id": "1157689", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157689" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572", "reference_id": "775572", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7817", "reference_id": "CVE-2014-7817", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7817" }, { "reference_url": "https://security.gentoo.org/glsa/201602-02", "reference_id": "GLSA-201602-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:2023", "reference_id": "RHSA-2014:2023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:2023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0016", "reference_id": "RHSA-2015:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0016" }, { "reference_url": "https://usn.ubuntu.com/2432-1/", "reference_id": "USN-2432-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2432-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036027?format=api", "purl": "pkg:deb/debian/glibc@2.19-15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-2tgj-syh1-pqaj" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-6t8d-48g7-1yey" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-7fvy-59bc-jqf6" }, { "vulnerability": "VCID-814q-u5m5-gqec" }, { "vulnerability": "VCID-84zb-rzwk-fbfp" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-991k-es3s-hbg4" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d1zs-8tg7-byhe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-edpa-k13r-uken" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f7vd-cpza-xfcx" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-fjrd-sadn-kfcf" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-hrky-wxm3-5fh3" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kpcn-f4dw-97hm" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nj37-pefw-rfbt" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-ppaj-d4b9-wuhf" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-r44h-gkxy-8kh2" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-ru1q-qgq2-h7ct" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-tp9v-vmge-nkdf" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vake-u1n1-x3hx" }, { "vulnerability": "VCID-ven5-emb5-a7bh" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-weg2-kxcj-fkcg" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-xyvn-w5ac-yqcn" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-z2xd-8n4a-b3cp" }, { "vulnerability": "VCID-zk4w-q3pr-myh6" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" } ], "aliases": [ "CVE-2014-7817" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ywmm-hzmg-z3b4" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15" }