| 0 |
| url |
VCID-2b4p-nehx-eyae |
| vulnerability_id |
VCID-2b4p-nehx-eyae |
| summary |
coreutils: tty hijacking possible in "su" via TIOCSTI ioctl |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4890 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33203 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33185 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33226 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33176 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33304 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33336 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33169 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33212 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33246 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33249 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00135 |
| scoring_system |
epss |
| scoring_elements |
0.33209 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4890 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-4890
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2b4p-nehx-eyae |
|
| 1 |
| url |
VCID-2bqp-dcbv-9yer |
| vulnerability_id |
VCID-2bqp-dcbv-9yer |
| summary |
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-3378 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17372 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17585 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17366 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17458 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17518 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17531 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17482 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17429 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17381 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-3378 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-3378
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2bqp-dcbv-9yer |
|
| 2 |
| url |
VCID-3wz1-hz4q-rqh5 |
| vulnerability_id |
VCID-3wz1-hz4q-rqh5 |
| summary |
An insecure temporary file usage in Shadow may allow local users to gain
root privileges. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5394 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24326 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24346 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24472 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24506 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24289 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24357 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24401 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24417 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24319 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24336 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5394 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5394
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3wz1-hz4q-rqh5 |
|
| 3 |
| url |
VCID-74yx-3zfw-w7f2 |
| vulnerability_id |
VCID-74yx-3zfw-w7f2 |
| summary |
A vulnerability found in Shadow may allow local attackers to bypass
security restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.43958 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.43935 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.43952 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.4392 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.43905 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.43966 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.4697 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47007 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47025 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.46973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47028 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7169
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-74yx-3zfw-w7f2 |
|
| 4 |
| url |
VCID-a5ny-vcsw-uqh1 |
| vulnerability_id |
VCID-a5ny-vcsw-uqh1 |
| summary |
Multiple vulnerabilities have been found in Shadow, the worst of
which might allow privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2616 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19196 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19295 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19429 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19477 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19195 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19273 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19325 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1933 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19282 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19227 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19187 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2616 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
(+, CVE-2017-2616, fix), regression
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ny-vcsw-uqh1 |
|
| 5 |
| url |
VCID-bcx3-q456-w7ad |
| vulnerability_id |
VCID-bcx3-q456-w7ad |
| summary |
shadow-utils: possible password leak during passwd(1) change |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4641 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03295 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03269 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03249 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03225 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03306 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03314 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03319 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03339 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03425 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4641 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4641
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bcx3-q456-w7ad |
|
| 6 |
| url |
VCID-cabd-74q6-kug2 |
| vulnerability_id |
VCID-cabd-74q6-kug2 |
| summary |
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-20002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16147 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1633 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16391 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1619 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16276 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1634 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16321 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16282 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16214 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16151 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16168 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-20002 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-20002
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cabd-74q6-kug2 |
|
| 7 |
| url |
VCID-gzq6-6n1d-jyd7 |
| vulnerability_id |
VCID-gzq6-6n1d-jyd7 |
| summary |
The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1844 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21196 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21347 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21402 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21155 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21234 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21296 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21212 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21215 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1844 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1844
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gzq6-6n1d-jyd7 |
|
| 8 |
| url |
VCID-jbed-4gsv-xkhu |
| vulnerability_id |
VCID-jbed-4gsv-xkhu |
| summary |
A security issue in shadow allows a local user to perform certain actions
with escalated privileges. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1174 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.2675 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26795 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26836 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.2662 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26687 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26738 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26742 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26697 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.2664 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26648 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26619 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1174 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1174
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jbed-4gsv-xkhu |
|
| 9 |
| url |
VCID-m3za-mkkw-p7e2 |
| vulnerability_id |
VCID-m3za-mkkw-p7e2 |
| summary |
shadow: Improper input validation in shadow-utils package utility chfn |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-29383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07011 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07031 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07066 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07096 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07104 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07092 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07082 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07911 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08592 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-29383 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-29383
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m3za-mkkw-p7e2 |
|
| 10 |
| url |
VCID-m4sf-znhe-gubc |
| vulnerability_id |
VCID-m4sf-znhe-gubc |
| summary |
A vulnerability found in Shadow may allow remote attackers to cause
a Denial of Service condition or produce other unspecified behaviors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12424 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69028 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69007 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70306 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.703 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70345 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.7036 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70384 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70293 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70323 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12424 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-12424
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m4sf-znhe-gubc |
|
| 11 |
| url |
VCID-m7wk-m2nu-abgf |
| vulnerability_id |
VCID-m7wk-m2nu-abgf |
| summary |
The installation of Debian GNU/Linux 3.1r1 from the network install CD creates /var/log/debian-installer/cdebconf with world writable permissions, which allows local users to cause a denial of service (disk consumption). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1376 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14684 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14734 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14809 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14613 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14702 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14762 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14722 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.1463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14521 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14527 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1376 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1376
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m7wk-m2nu-abgf |
|
| 12 |
|
| 13 |
| url |
VCID-r9a4-2dw5-4bgq |
| vulnerability_id |
VCID-r9a4-2dw5-4bgq |
| summary |
Multiple Shadow utilities were installed with setuid permissions,
allowing possible root privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19882 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26202 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26282 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26324 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26096 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26163 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26211 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2622 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26174 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26119 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26097 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19882 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19882
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r9a4-2dw5-4bgq |
|
| 14 |
| url |
VCID-ueu4-n6bt-xfat |
| vulnerability_id |
VCID-ueu4-n6bt-xfat |
| summary |
Multiple vulnerabilities have been found in Shadow, the worst of
which might allow privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28229 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28142 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28148 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28161 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28299 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28343 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28134 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.282 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28243 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28249 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00103 |
| scoring_system |
epss |
| scoring_elements |
0.28206 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6252 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6252
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ueu4-n6bt-xfat |
|
| 15 |
| url |
VCID-z4em-vwpw-efd7 |
| vulnerability_id |
VCID-z4em-vwpw-efd7 |
| summary |
Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23909 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23923 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24087 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23869 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23983 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23999 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23956 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23899 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-1001 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-1001
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z4em-vwpw-efd7 |
|
| 16 |
| url |
VCID-zbq9-jt94-ckhd |
| vulnerability_id |
VCID-zbq9-jt94-ckhd |
| summary |
This GLSA contains notification of vulnerabilities found in several
Gentoo packages which have been fixed prior to January 1, 2012. The worst
of these vulnerabilities could lead to local privilege escalation and
remote code execution. Please see the package list and CVE identifiers
below for more information. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0721 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80619 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80532 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80561 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80582 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80592 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80609 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80596 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80588 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80617 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0721 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0721
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zbq9-jt94-ckhd |
|