Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1036928?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1036928?format=api", "purl": "pkg:deb/debian/glibc@2.24-10", "type": "deb", "namespace": "debian", "name": "glibc", "version": "2.24-10", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.36-8", "latest_non_vulnerable_version": "2.42-15", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43777?format=api", "vulnerability_id": "VCID-13gq-1x22-skhy", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1686", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16849", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17028", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16952", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1701", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16985", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16819", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893708", "reference_id": "1893708", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893708" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914", "reference_id": "973914", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210401-0006/", "reference_id": "ntap-20210401-0006", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210401-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21", "reference_id": "show_bug.cgi?id=19519#c21", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224", "reference_id": "show_bug.cgi?id=26224", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-27618" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13gq-1x22-skhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62168?format=api", "vulnerability_id": "VCID-2gmq-64e3-c7db", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.5946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66912", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013", "reference_id": "2042013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768", "reference_id": "show_bug.cgi?id=28768", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2022-23218" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gmq-64e3-c7db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=api", "vulnerability_id": "VCID-3hqs-jns2-puf2", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.7018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70165", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70196", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00624", "scoring_system": "epss", "scoring_elements": "0.70205", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75216", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202", "reference_id": "2277202", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005", "reference_id": "GLIBC-SA-2024-0005", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0011/", "reference_id": "ntap-20240524-0011", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0011/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33599" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81840?format=api", "vulnerability_id": "VCID-6kb1-yuq8-tfbs", "summary": "glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03129", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06277", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06327", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06404", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06399", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25204" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681", "reference_id": "1774681", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250", "reference_id": "945250", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126", "reference_id": "CVE-2019-19126", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1828", "reference_id": "RHSA-2020:1828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3861", "reference_id": "RHSA-2020:3861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2019-19126" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kb1-yuq8-tfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62165?format=api", "vulnerability_id": "VCID-6qa1-upks-g3dm", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74883", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74808", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74858", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74892", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637", "reference_id": "2024637", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/24/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/01/24/4" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3999", "reference_id": "CVE-2021-3999", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2021-3999" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2021-3999", "reference_id": "CVE-2021-3999", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-3999" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e", "reference_id": "gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221104-0001/", "reference_id": "ntap-20221104-0001", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221104-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769", "reference_id": "show_bug.cgi?id=28769", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050173?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u5" } ], "aliases": [ "CVE-2021-3999" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61415?format=api", "vulnerability_id": "VCID-75dc-1fd5-u3e2", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9169", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0708", "scoring_system": "epss", "scoring_elements": "0.91536", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0708", "scoring_system": "epss", "scoring_elements": "0.91541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12135", "scoring_system": "epss", "scoring_elements": "0.93818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94238", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.9425", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13732", "scoring_system": "epss", "scoring_elements": "0.94268", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9" }, { "reference_url": "https://support.f5.com/csp/article/K54823184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K54823184" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "http://www.securityfocus.com/bid/107160", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107160" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684057", "reference_id": "1684057", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684057" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612", "reference_id": "924612", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612" }, { "reference_url": "https://security.archlinux.org/ASA-201911-3", "reference_id": "ASA-201911-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201911-3" }, { "reference_url": "https://security.archlinux.org/AVG-855", "reference_id": "AVG-855", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-855" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9169", "reference_id": "CVE-2019-9169", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9169" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049937?format=api", "purl": "pkg:deb/debian/glibc@2.28-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-10" } ], "aliases": [ "CVE-2019-9169" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75dc-1fd5-u3e2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83798?format=api", "vulnerability_id": "VCID-8egr-f63v-3uht", "summary": "glibc: Buffer overflow triggerable via LD_LIBRARY_PATH", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000409", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00841", "scoring_system": "epss", "scoring_elements": "0.74681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.7541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75419", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75406", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75447", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75454", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75443", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000409" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522830", "reference_id": "1522830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522830" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133", "reference_id": "884133", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000409" ], "risk_score": 8.4, "exploitability": "2.0", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8egr-f63v-3uht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43780?format=api", "vulnerability_id": "VCID-8p27-z2tz-4bbm", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30847", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30818", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30873", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30852", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30973", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30927", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30842", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408", "reference_id": "1965408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147", "reference_id": "989147", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2021-33574" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59737?format=api", "vulnerability_id": "VCID-b6tp-a1qc-pfdw", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6096", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8318", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8324", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8321", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83208", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89128", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6096" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25620", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" }, { "reference_url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820331", "reference_id": "1820331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820331" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452", "reference_id": "961452", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6096", "reference_id": "CVE-2020-6096", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/" } ], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://usn.ubuntu.com/4954-1/", "reference_id": "USN-4954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4954-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-6096" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b6tp-a1qc-pfdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=api", "vulnerability_id": "VCID-bcuy-bbxf-x7hy", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4522", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45229", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45231", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54576", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204", "reference_id": "2277204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006", "reference_id": "GLIBC-SA-2024-0006", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0013/", "reference_id": "ntap-20240524-0013", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33600" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=api", "vulnerability_id": "VCID-bsue-bznw-1ffe", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28523", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28476", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28387", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28379", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34852", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205", "reference_id": "2277205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007", "reference_id": "GLIBC-SA-2024-0007", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0014/", "reference_id": "ntap-20240524-0014", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0014/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33601" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61414?format=api", "vulnerability_id": "VCID-c4w6-89qu-xkev", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-7309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37738", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.3775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.4428", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44303", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44351", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-7309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24155" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html" }, { "reference_url": "http://www.securityfocus.com/bid/106835", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106835" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672232", "reference_id": "1672232", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672232" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7309", "reference_id": "CVE-2019-7309", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7309" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2019-7309" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4w6-89qu-xkev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31487?format=api", "vulnerability_id": "VCID-cv87-rxmr-cqhn", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45897", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45908", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45928", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45952", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.6081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60839", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22325" }, { "reference_url": "http://www.securityfocus.com/bid/101517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101517" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504806", "reference_id": "1504806", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500", "reference_id": "879500", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500" }, { "reference_url": "https://security.archlinux.org/ASA-201801-8", "reference_id": "ASA-201801-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-8" }, { "reference_url": "https://security.archlinux.org/ASA-201801-9", "reference_id": "ASA-201801-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-9" }, { "reference_url": "https://security.archlinux.org/AVG-460", "reference_id": "AVG-460", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671", "reference_id": "CVE-2017-15671", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15671" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cv87-rxmr-cqhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43044?format=api", "vulnerability_id": "VCID-d5xx-af6p-2fhn", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13181", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13129", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13249", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468", "reference_id": "2367468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468" }, { "reference_url": "https://security.gentoo.org/glsa/202509-04", "reference_id": "GLSA-202509-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202509-04" }, { "reference_url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e", "reference_id": "?id=1e18586c5820e329f741d5c710275e165581380e", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/" } ], "url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10219", "reference_id": "RHSA-2025:10219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10220", "reference_id": "RHSA-2025:10220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10294", "reference_id": "RHSA-2025:10294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11487", "reference_id": "RHSA-2025:11487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8655", "reference_id": "RHSA-2025:8655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8686", "reference_id": "RHSA-2025:8686", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8686" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9028", "reference_id": "RHSA-2025:9028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9336", "reference_id": "RHSA-2025:9336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9725", "reference_id": "RHSA-2025:9725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9750", "reference_id": "RHSA-2025:9750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9750" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976", "reference_id": "show_bug.cgi?id=32976", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976" }, { "reference_url": "https://usn.ubuntu.com/7541-1/", "reference_id": "USN-7541-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7541-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api", "purl": "pkg:deb/debian/glibc@2.36-8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8" } ], "aliases": [ "CVE-2025-4802" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43779?format=api", "vulnerability_id": "VCID-dqgn-fdxt-u3cc", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38447", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38548", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38527", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38494", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38554", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916", "reference_id": "1921916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/01/28/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2021/01/28/2" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198", "reference_id": "981198", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210304-0007/", "reference_id": "ntap-20210304-0007", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210304-0007/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256", "reference_id": "show_bug.cgi?id=27256", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5699-1/", "reference_id": "USN-5699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5699-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api", "purl": "pkg:deb/debian/glibc@2.31-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11" } ], "aliases": [ "CVE-2021-3326" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqgn-fdxt-u3cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83686?format=api", "vulnerability_id": "VCID-e27x-ufvw-cyec", "summary": "glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11236", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76603", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76537", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.7652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00965", "scoring_system": "epss", "scoring_elements": "0.76568", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11236" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.securityfocus.com/bid/104255", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104255" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581269", "reference_id": "1581269", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581269" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071", "reference_id": "899071", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11236", "reference_id": "CVE-2018-11236", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-11236" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e27x-ufvw-cyec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82700?format=api", "vulnerability_id": "VCID-evbv-ckb4-yybq", "summary": "glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80034", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80113", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80083", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80112", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80062", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80079", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01348", "scoring_system": "epss", "scoring_elements": "0.80091", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806" }, { "reference_url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238", "reference_id": "", "reference_type": "", "scores": [], "url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190315-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=11053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=11053" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18986" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672" }, { "reference_url": "https://support.f5.com/csp/article/K64119434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K64119434" }, { "reference_url": "https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683683", "reference_id": "1683683", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683683" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613", "reference_id": "924613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5155", "reference_id": "CVE-2009-5155", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5155" }, { "reference_url": "https://usn.ubuntu.com/4954-1/", "reference_id": "USN-4954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4954-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2009-5155" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evbv-ckb4-yybq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83797?format=api", "vulnerability_id": "VCID-f9ts-xn57-6qa8", "summary": "glibc: Memory leak reachable via LD_HWCAP_MASK", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73386", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73409", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73418", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.7347", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73472", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522828", "reference_id": "1522828", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522828" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132", "reference_id": "884132", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt", "reference_id": "CVE-2017-1000409;CVE-2017-1000408", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000408" ], "risk_score": 6.0, "exploitability": "2.0", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ts-xn57-6qa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62166?format=api", "vulnerability_id": "VCID-ge24-a7a4-d3bn", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78075", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78154", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78123", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81723", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.81682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01598", "scoring_system": "epss", "scoring_elements": "0.8172", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975", "reference_id": "1977975", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542", "reference_id": "990542", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210827-0005/", "reference_id": "ntap-20210827-0005", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210827-0005/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" }, { "reference_url": "https://sourceware.org/glibc/wiki/Security%20Exceptions", "reference_id": "Security%20Exceptions", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/glibc/wiki/Security%20Exceptions" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011", "reference_id": "show_bug.cgi?id=28011", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5699-1/", "reference_id": "USN-5699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5699-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050170?format=api", "purl": "pkg:deb/debian/glibc@2.31-13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13" } ], "aliases": [ "CVE-2021-35942" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34316?format=api", "vulnerability_id": "VCID-gv4u-g36a-w3cf", "summary": "Multiple vulnerabilities in glibc could result in Local Privilege Escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.59128", "scoring_system": "epss", "scoring_elements": "0.9822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.59128", "scoring_system": "epss", "scoring_elements": "0.98223", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.67392", "scoring_system": "epss", "scoring_elements": "0.98574", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.72535", "scoring_system": "epss", "scoring_elements": "0.98763", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.72771", "scoring_system": "epss", "scoring_elements": "0.98771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.9884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98837", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.74256", "scoring_system": "epss", "scoring_elements": "0.98845", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352", "reference_id": "2238352", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8" }, { "reference_url": "https://www.qualys.com/cve-2023-4911/", "reference_id": "cve-2023-4911", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://www.qualys.com/cve-2023-4911/" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4911", "reference_id": "CVE-2023-4911", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-4911" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt", "reference_id": "CVE-2023-4911", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt" }, { "reference_url": "https://security.gentoo.org/glsa/202310-03", "reference_id": "GLSA-202310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202310-03" }, { "reference_url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "reference_id": "looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5453", "reference_id": "RHSA-2023:5453", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5454", "reference_id": "RHSA-2023:5454", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5455", "reference_id": "RHSA-2023:5455", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5476", "reference_id": "RHSA-2023:5476", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:5476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0033", "reference_id": "RHSA-2024:0033", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0033" }, { "reference_url": "https://usn.ubuntu.com/6409-1/", "reference_id": "USN-6409-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6409-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2023-4911" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31488?format=api", "vulnerability_id": "VCID-hdz6-ewkg-xqc9", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43014", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43061", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43077", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43137", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43127", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43072", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.431", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43092", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43104", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22332" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8" }, { "reference_url": "http://www.securityfocus.com/bid/101535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505298", "reference_id": "1505298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505298" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955", "reference_id": "879955", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804", "reference_id": "CVE-2017-15804", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1879", "reference_id": "RHSA-2018:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1879" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15804" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz6-ewkg-xqc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59735?format=api", "vulnerability_id": "VCID-hj77-4nfx-fuaa", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16186", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16169", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16319", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16301", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16131", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16149", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905217", "reference_id": "1905217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905217" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391", "reference_id": "976391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210122-0004/", "reference_id": "ntap-20210122-0004", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210122-0004/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26923", "reference_id": "show_bug.cgi?id=26923", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26923" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/", "reference_id": "TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-29562" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hj77-4nfx-fuaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84601?format=api", "vulnerability_id": "VCID-jadt-55f6-uuh6", "summary": "glibc: Use-after-free read access in clntudp_call in sunrpc", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64777", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.6479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64744", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64749", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64769", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478288", "reference_id": "1478288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478288" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648", "reference_id": "870648", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648" }, { "reference_url": "https://security.archlinux.org/AVG-368", "reference_id": "AVG-368", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-368" }, { "reference_url": "https://security.archlinux.org/AVG-369", "reference_id": "AVG-369", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-369" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-12133" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jadt-55f6-uuh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85196?format=api", "vulnerability_id": "VCID-jnz7-w98a-kqgs", "summary": "glibc: getaddrinfo should reject IP addresses with trailing characters", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06387", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12189", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12192", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12297", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1233", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=20018" }, { "reference_url": "http://www.securityfocus.com/bid/106672", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106672" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549", "reference_id": "1347549", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347549" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047", "reference_id": "920047", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047" }, { "reference_url": "https://security.archlinux.org/AVG-1984", "reference_id": "AVG-1984", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1984" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739", "reference_id": "CVE-2016-10739", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2118", "reference_id": "RHSA-2019:2118", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2118" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3513", "reference_id": "RHSA-2019:3513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3513" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2016-10739" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnz7-w98a-kqgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83763?format=api", "vulnerability_id": "VCID-kxg9-kntn-xqan", "summary": "glibc: memory corruption in memcpy-sse2-unaligned.S", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18269", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78068", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78152", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78158", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.7812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78146", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78128", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/fingolfin/memmove-bug", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/fingolfin/memmove-bug" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22644" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580924", "reference_id": "1580924", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580924" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18269", "reference_id": "CVE-2017-18269", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18269" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-18269" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kxg9-kntn-xqan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61416?format=api", "vulnerability_id": "VCID-mqch-gxfq-zyhh", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12802", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.129", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15601", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670", "reference_id": "1810670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108", "reference_id": "953108", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2998", "reference_id": "RHSA-2021:2998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3315", "reference_id": "RHSA-2021:3315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3315" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-10029" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqch-gxfq-zyhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79939?format=api", "vulnerability_id": "VCID-nk5x-uhcf-7kan", "summary": "glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69399", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69418", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69398", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69407", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652", "reference_id": "2020652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622", "reference_id": "998622", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2021-43396" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61417?format=api", "vulnerability_id": "VCID-pyms-pya1-buck", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33535", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33687", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33601", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33599", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47732", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810719", "reference_id": "1810719", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810719" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-1751" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyms-pya1-buck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84471?format=api", "vulnerability_id": "VCID-q5az-xe7k-m7av", "summary": "glibc: Fragmentation attacks possible when EDNS0 is enabled", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52657", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52786", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52795", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52702", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52745", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5274", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5279", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52774", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52758", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477529", "reference_id": "1477529", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477529" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650", "reference_id": "870650", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650" }, { "reference_url": "https://security.archlinux.org/AVG-368", "reference_id": "AVG-368", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-368" }, { "reference_url": "https://security.archlinux.org/AVG-369", "reference_id": "AVG-369", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-369" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-12132" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5az-xe7k-m7av" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31491?format=api", "vulnerability_id": "VCID-qaaq-fss4-1kgr", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.7801", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.77992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78027", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01095", "scoring_system": "epss", "scoring_elements": "0.78019", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542102", "reference_id": "1542102", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542102" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159", "reference_id": "878159", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4218-1/", "reference_id": "USN-4218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4218-1/" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-6485" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qaaq-fss4-1kgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31492?format=api", "vulnerability_id": "VCID-qwx5-bayb-bkcg", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61767", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542119", "reference_id": "1542119", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542119" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-6551" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwx5-bayb-bkcg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39606?format=api", "vulnerability_id": "VCID-rqh3-5xc2-uyab", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000366", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91821", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91875", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91865", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91866", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91881", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91877", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07617", "scoring_system": "epss", "scoring_elements": "0.91862", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543", "reference_id": "1452543", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543" }, { "reference_url": "https://security.archlinux.org/ASA-201706-22", "reference_id": "ASA-201706-22", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-22" }, { "reference_url": "https://security.archlinux.org/ASA-201706-23", "reference_id": "ASA-201706-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-23" }, { "reference_url": "https://security.archlinux.org/AVG-307", "reference_id": "AVG-307", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-307" }, { "reference_url": "https://security.archlinux.org/AVG-308", "reference_id": "AVG-308", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-308" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c", "reference_id": "CVE-2017-1000370;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c", "reference_id": "CVE-2017-1000370;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c", "reference_id": "CVE-2017-1000371;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c", "reference_id": "CVE-2017-1000371;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c", "reference_id": "CVE-2017-1000379;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c" }, { "reference_url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c", "reference_id": "CVE-2017-1000379;CVE-2017-1000366", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1479", "reference_id": "RHSA-2017:1479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1480", "reference_id": "RHSA-2017:1480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1481", "reference_id": "RHSA-2017:1481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1567", "reference_id": "RHSA-2017:1567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1567" }, { "reference_url": "https://usn.ubuntu.com/3323-1/", "reference_id": "USN-3323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3323-1/" }, { "reference_url": "https://usn.ubuntu.com/3323-2/", "reference_id": "USN-3323-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3323-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036929?format=api", "purl": "pkg:deb/debian/glibc@2.24-11%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-11%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-1000366" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqh3-5xc2-uyab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61413?format=api", "vulnerability_id": "VCID-rt4z-2rd4-qfde", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6488", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35489", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35505", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35514", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35449", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24097" }, { "reference_url": "http://www.securityfocus.com/bid/106671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106671" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667931", "reference_id": "1667931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667931" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6488", "reference_id": "CVE-2019-6488", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6488" }, { "reference_url": "https://security.gentoo.org/glsa/202006-04", "reference_id": "GLSA-202006-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2019-6488" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rt4z-2rd4-qfde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43776?format=api", "vulnerability_id": "VCID-sbzq-gp2e-v7fy", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25013", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.7417", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74088", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.7409", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74179", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74171", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74133", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74157", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74121", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-25013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960", "reference_id": "1912960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/", "reference_id": "4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273", "reference_id": "979273", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273" }, { "reference_url": "https://security.archlinux.org/ASA-202102-16", "reference_id": "ASA-202102-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-16" }, { "reference_url": "https://security.archlinux.org/ASA-202102-17", "reference_id": "ASA-202102-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-17" }, { "reference_url": "https://security.archlinux.org/AVG-1320", "reference_id": "AVG-1320", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1320" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210205-0004/", "reference_id": "ntap-20210205-0004", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210205-0004/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b", "reference_id": "?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b" }, { "reference_url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E", "reference_id": "r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E", "reference_id": "r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E", "reference_id": "r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E", "reference_id": "r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E", "reference_id": "r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E", "reference_id": "r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E", "reference_id": "r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E", "reference_id": "rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0348", "reference_id": "RHSA-2021:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0348" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24973", "reference_id": "show_bug.cgi?id=24973", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/", "reference_id": "TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2019-25013" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sbzq-gp2e-v7fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=api", "vulnerability_id": "VCID-sjav-8bub-eycz", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.91755", "scoring_system": "epss", "scoring_elements": "0.99689", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.9971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99712", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92156", "scoring_system": "epss", "scoring_elements": "0.99709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.92578", "scoring_system": "epss", "scoring_elements": "0.99739", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191", "reference_id": "1069191", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/24/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/24/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404", "reference_id": "2273404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/18/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/18/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/27/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/17/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/17/9" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/", "reference_id": "BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004", "reference_id": "GLIBC-SA-2024-0004", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0002/", "reference_id": "ntap-20240531-0002", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240531-0002/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/", "reference_id": "P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2722", "reference_id": "RHSA-2024:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3269", "reference_id": "RHSA-2024:3269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7590", "reference_id": "RHSA-2024:7590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7594", "reference_id": "RHSA-2024:7594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7599", "reference_id": "RHSA-2024:7599", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7939", "reference_id": "RHSA-2024:7939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8235", "reference_id": "RHSA-2024:8235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8235" }, { "reference_url": "https://usn.ubuntu.com/6737-1/", "reference_id": "USN-6737-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6737-1/" }, { "reference_url": "https://usn.ubuntu.com/6737-2/", "reference_id": "USN-6737-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6737-2/" }, { "reference_url": "https://usn.ubuntu.com/6762-1/", "reference_id": "USN-6762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6762-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/", "reference_id": "YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-2961" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83453?format=api", "vulnerability_id": "VCID-uqdb-tx7y-bbbc", "summary": "glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73959", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74047", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74055", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.7401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190329-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190329-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190401-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190401-0001/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196" }, { "reference_url": "https://www.exploit-db.com/exploits/44750/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44750/" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.securityfocus.com/bid/104256", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104256" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581274", "reference_id": "1581274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581274" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070", "reference_id": "899070", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11237", "reference_id": "CVE-2018-11237", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-11237" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqdb-tx7y-bbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36350?format=api", "vulnerability_id": "VCID-utss-75dn-r3b7", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41883", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41953", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41945", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41972", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41931", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8985" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/14/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/14/9" }, { "reference_url": "http://www.securityfocus.com/bid/76916", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/76916" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197798", "reference_id": "1197798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197798" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8985", "reference_id": "CVE-2015-8985", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8985" }, { "reference_url": "https://security.gentoo.org/glsa/201908-06", "reference_id": "GLSA-201908-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2015-8985" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utss-75dn-r3b7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59733?format=api", "vulnerability_id": "VCID-v96m-se3g-8ydp", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61384", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61538", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.6155", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61461", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61489", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61543", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61529", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61509", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428290", "reference_id": "1428290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428290" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503", "reference_id": "856503", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585", "reference_id": "RHSA-2021:1585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1585" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5768-1/", "reference_id": "USN-5768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2016-10228" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v96m-se3g-8ydp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36352?format=api", "vulnerability_id": "VCID-vajf-thpr-pbat", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80134", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80141", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80186", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.80161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01364", "scoring_system": "epss", "scoring_elements": "0.8015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82677", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82673", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.8271", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01775", "scoring_system": "epss", "scoring_elements": "0.82711", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591" }, { "reference_url": "http://www.securitytracker.com/id/1042174", "reference_id": "1042174", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "http://www.securitytracker.com/id/1042174" }, { "reference_url": "http://www.securityfocus.com/bid/106037", "reference_id": "106037", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "http://www.securityfocus.com/bid/106037" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653993", "reference_id": "1653993", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653993" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837", "reference_id": "914837", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837" }, { "reference_url": "https://security.archlinux.org/AVG-830", "reference_id": "AVG-830", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-830" }, { "reference_url": "https://security.archlinux.org/AVG-831", "reference_id": "AVG-831", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-831" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/", "reference_id": "BO7WHN52GFMC5F2I2232GFIPSSXWFV7G", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408", "reference_id": "gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408" }, { "reference_url": "https://security.gentoo.org/glsa/201903-09", "reference_id": "GLSA-201903-09", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.gentoo.org/glsa/201903-09" }, { "reference_url": "https://security.gentoo.org/glsa/201908-06", "reference_id": "GLSA-201908-06", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.gentoo.org/glsa/201908-06" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/", "reference_id": "M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190321-0003/", "reference_id": "ntap-20190321-0003", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20190321-0003/" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD", "reference_id": "?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23927", "reference_id": "show_bug.cgi?id=23927", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23927" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/" } ], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-19591" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vajf-thpr-pbat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59734?format=api", "vulnerability_id": "VCID-vqyv-kf5w-vkch", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1752", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40442", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40469", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40515", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40495", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40543", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40511", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810718", "reference_id": "1810718", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810718" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788", "reference_id": "953788", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788" }, { "reference_url": "https://security.gentoo.org/glsa/202101-20", "reference_id": "GLSA-202101-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4444", "reference_id": "RHSA-2020:4444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4444" }, { "reference_url": "https://usn.ubuntu.com/4416-1/", "reference_id": "USN-4416-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4416-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049939?format=api", "purl": "pkg:deb/debian/glibc@2.31-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9" } ], "aliases": [ "CVE-2020-1752" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyv-kf5w-vkch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31486?format=api", "vulnerability_id": "VCID-wctr-ebf2-gqa1", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44273", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4432", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44302", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44354", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22320" }, { "reference_url": "http://www.securityfocus.com/bid/101521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101521" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504804", "reference_id": "1504804", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504804" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501", "reference_id": "879501", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501" }, { "reference_url": "https://security.archlinux.org/ASA-201801-8", "reference_id": "ASA-201801-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-8" }, { "reference_url": "https://security.archlinux.org/ASA-201801-9", "reference_id": "ASA-201801-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-9" }, { "reference_url": "https://security.archlinux.org/AVG-460", "reference_id": "AVG-460", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-460" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670", "reference_id": "CVE-2017-15670", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1879", "reference_id": "RHSA-2018:1879", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1879" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-15670" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wctr-ebf2-gqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31489?format=api", "vulnerability_id": "VCID-wp12-z5a5-pbgd", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:0327" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75266", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75358", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.7527", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.7528", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75334", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75355", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16997" }, { "reference_url": "https://bugs.debian.org/884615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/884615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22625" }, { "reference_url": "https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html" }, { "reference_url": "http://www.securityfocus.com/bid/102228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102228" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526865", "reference_id": "1526865", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526865" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615", "reference_id": "884615", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997", "reference_id": "CVE-2017-16997", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3092", "reference_id": "RHSA-2018:3092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3092" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2017-16997" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp12-z5a5-pbgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62169?format=api", "vulnerability_id": "VCID-wp18-zqr6-a3ag", "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.5946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00523", "scoring_system": "epss", "scoring_elements": "0.66912", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017", "reference_id": "2042017", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017" }, { "reference_url": "https://security.gentoo.org/glsa/202208-24", "reference_id": "GLSA-202208-24", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/" } ], "url": "https://security.gentoo.org/glsa/202208-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896", "reference_id": "RHSA-2022:0896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0896" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542", "reference_id": "show_bug.cgi?id=22542", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" }, { "reference_url": "https://usn.ubuntu.com/5310-2/", "reference_id": "USN-5310-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3" } ], "aliases": [ "CVE-2022-23219" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp18-zqr6-a3ag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31490?format=api", "vulnerability_id": "VCID-ww2m-6691-yfa7", "summary": "Multiple vulnerabilities have been found in glibc, the worst of\n which could allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.974", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97409", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97412", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.9739", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97396", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.41417", "scoring_system": "epss", "scoring_elements": "0.97399", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97524", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.44049", "scoring_system": "epss", "scoring_elements": "0.97518", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533836", "reference_id": "1533836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001", "reference_id": "887001", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001" }, { "reference_url": "https://security.archlinux.org/ASA-201801-18", "reference_id": "ASA-201801-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-18" }, { "reference_url": "https://security.archlinux.org/ASA-201801-19", "reference_id": "ASA-201801-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-19" }, { "reference_url": "https://security.archlinux.org/AVG-590", "reference_id": "AVG-590", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-590" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb" }, { "reference_url": "https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c", "reference_id": "CVE-2018-1000001", "reference_type": "exploit", "scores": [], "url": "https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c" }, { "reference_url": "https://security.gentoo.org/glsa/201804-02", "reference_id": "GLSA-201804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/3534-1/", "reference_id": "USN-3534-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3534-1/" }, { "reference_url": "https://usn.ubuntu.com/3536-1/", "reference_id": "USN-3536-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3536-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-4768-1/", "reference_id": "USN-USN-4768-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4768-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049095?format=api", "purl": "pkg:deb/debian/glibc@2.28-7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-7" } ], "aliases": [ "CVE-2018-1000001" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ww2m-6691-yfa7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=api", "vulnerability_id": "VCID-xhcm-t8jb-ybfb", "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63661", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63676", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.6366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63673", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00627", "scoring_system": "epss", "scoring_elements": "0.70258", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206", "reference_id": "2277206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008", "reference_id": "GLIBC-SA-2024-0008", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008" }, { "reference_url": "https://security.gentoo.org/glsa/202405-17", "reference_id": "GLSA-202405-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0012/", "reference_id": "ntap-20240524-0012", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240524-0012/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799", "reference_id": "RHSA-2024:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309", "reference_id": "RHSA-2024:3309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312", "reference_id": "RHSA-2024:3312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339", "reference_id": "RHSA-2024:3339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344", "reference_id": "RHSA-2024:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411", "reference_id": "RHSA-2024:3411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423", "reference_id": "RHSA-2024:3423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464", "reference_id": "RHSA-2024:3464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588", "reference_id": "RHSA-2024:3588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126", "reference_id": "RHSA-2024:4126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4126" }, { "reference_url": "https://usn.ubuntu.com/6804-1/", "reference_id": "USN-6804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api", "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3e43-r92j-hkd3" }, { "vulnerability": "VCID-9nqp-tfvr-ayen" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-jswq-6ru6-wybc" }, { "vulnerability": "VCID-kukb-s61t-pbc3" }, { "vulnerability": "VCID-nwfb-xnks-1kg7" }, { "vulnerability": "VCID-ssnc-wdcf-sfc9" }, { "vulnerability": "VCID-tcpv-4crc-zuap" }, { "vulnerability": "VCID-us68-psx5-zude" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zn6t-3mvb-wufm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11" } ], "aliases": [ "CVE-2024-33602" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61864?format=api", "vulnerability_id": "VCID-ys5d-7xgp-w7g5", "summary": "A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21685", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21899", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21664", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21798", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21808", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21768", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21718", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html", "reference_id": "000044.html", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460", "reference_id": "2339460", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2025/01/22/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2025/01/22/4" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001", "reference_id": "GLIBC-SA-2025-0001", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001" }, { "reference_url": "https://security.gentoo.org/glsa/202505-06", "reference_id": "GLSA-202505-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3828", "reference_id": "RHSA-2025:3828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4241", "reference_id": "RHSA-2025:4241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4242", "reference_id": "RHSA-2025:4242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4243", "reference_id": "RHSA-2025:4243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4244", "reference_id": "RHSA-2025:4244", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4244" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582", "reference_id": "show_bug.cgi?id=32582", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582" }, { "reference_url": "https://usn.ubuntu.com/7259-1/", "reference_id": "USN-7259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-1/" }, { "reference_url": "https://usn.ubuntu.com/7259-2/", "reference_id": "USN-7259-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-2/" }, { "reference_url": "https://usn.ubuntu.com/7259-3/", "reference_id": "USN-7259-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7259-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api", "purl": "pkg:deb/debian/glibc@2.36-8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8" } ], "aliases": [ "CVE-2025-0395" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43778?format=api", "vulnerability_id": "VCID-zqx5-4rdk-1qa3", "summary": "Multiple vulnerabilities in glibc could result in Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11232", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11242", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11048", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11057", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589", "reference_id": "1932589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/", "reference_id": "7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479", "reference_id": "983479", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479" }, { "reference_url": "https://security.archlinux.org/AVG-1621", "reference_id": "AVG-1621", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1621" }, { "reference_url": "https://security.gentoo.org/glsa/202107-07", "reference_id": "GLSA-202107-07", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://security.gentoo.org/glsa/202107-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/", "reference_id": "I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358", "reference_id": "RHSA-2021:4358", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4358" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462", "reference_id": "show_bug.cgi?id=27462", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462" }, { "reference_url": "https://usn.ubuntu.com/5310-1/", "reference_id": "USN-5310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api", "purl": "pkg:deb/debian/glibc@2.31-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11" } ], "aliases": [ "CVE-2021-27645" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39605?format=api", "vulnerability_id": "VCID-edpa-k13r-uken", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.7833", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78313", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78375", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01133", "scoring_system": "epss", "scoring_elements": "0.78372", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383297", "reference_id": "1383297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383297" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752", "reference_id": "834752", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036928?format=api", "purl": "pkg:deb/debian/glibc@2.24-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-10" } ], "aliases": [ "CVE-2016-6323" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edpa-k13r-uken" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39601?format=api", "vulnerability_id": "VCID-vake-u1n1-x3hx", "summary": "Multiple vulnerabilities have been found in the GNU C Library, the\n worst of which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.6116", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61318", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.6124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61269", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72878", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00737", "scoring_system": "epss", "scoring_elements": "0.72876", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249603", "reference_id": "1249603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249603" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106", "reference_id": "796106", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106" }, { "reference_url": "https://security.gentoo.org/glsa/201706-19", "reference_id": "GLSA-201706-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0805", "reference_id": "RHSA-2018:0805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0805" }, { "reference_url": "https://usn.ubuntu.com/3239-1/", "reference_id": "USN-3239-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3239-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036928?format=api", "purl": "pkg:deb/debian/glibc@2.24-10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13gq-1x22-skhy" }, { "vulnerability": "VCID-2gmq-64e3-c7db" }, { "vulnerability": "VCID-3hqs-jns2-puf2" }, { "vulnerability": "VCID-6kb1-yuq8-tfbs" }, { "vulnerability": "VCID-6qa1-upks-g3dm" }, { "vulnerability": "VCID-75dc-1fd5-u3e2" }, { "vulnerability": "VCID-8egr-f63v-3uht" }, { "vulnerability": "VCID-8p27-z2tz-4bbm" }, { "vulnerability": "VCID-b6tp-a1qc-pfdw" }, { "vulnerability": "VCID-bcuy-bbxf-x7hy" }, { "vulnerability": "VCID-bsue-bznw-1ffe" }, { "vulnerability": "VCID-c4w6-89qu-xkev" }, { "vulnerability": "VCID-cv87-rxmr-cqhn" }, { "vulnerability": "VCID-d5xx-af6p-2fhn" }, { "vulnerability": "VCID-dqgn-fdxt-u3cc" }, { "vulnerability": "VCID-e27x-ufvw-cyec" }, { "vulnerability": "VCID-evbv-ckb4-yybq" }, { "vulnerability": "VCID-f9ts-xn57-6qa8" }, { "vulnerability": "VCID-ge24-a7a4-d3bn" }, { "vulnerability": "VCID-gv4u-g36a-w3cf" }, { "vulnerability": "VCID-hdz6-ewkg-xqc9" }, { "vulnerability": "VCID-hj77-4nfx-fuaa" }, { "vulnerability": "VCID-jadt-55f6-uuh6" }, { "vulnerability": "VCID-jnz7-w98a-kqgs" }, { "vulnerability": "VCID-kxg9-kntn-xqan" }, { "vulnerability": "VCID-mqch-gxfq-zyhh" }, { "vulnerability": "VCID-nk5x-uhcf-7kan" }, { "vulnerability": "VCID-pyms-pya1-buck" }, { "vulnerability": "VCID-q5az-xe7k-m7av" }, { "vulnerability": "VCID-qaaq-fss4-1kgr" }, { "vulnerability": "VCID-qwx5-bayb-bkcg" }, { "vulnerability": "VCID-rqh3-5xc2-uyab" }, { "vulnerability": "VCID-rt4z-2rd4-qfde" }, { "vulnerability": "VCID-sbzq-gp2e-v7fy" }, { "vulnerability": "VCID-sjav-8bub-eycz" }, { "vulnerability": "VCID-uqdb-tx7y-bbbc" }, { "vulnerability": "VCID-utss-75dn-r3b7" }, { "vulnerability": "VCID-v96m-se3g-8ydp" }, { "vulnerability": "VCID-vajf-thpr-pbat" }, { "vulnerability": "VCID-vqyv-kf5w-vkch" }, { "vulnerability": "VCID-wctr-ebf2-gqa1" }, { "vulnerability": "VCID-wp12-z5a5-pbgd" }, { "vulnerability": "VCID-wp18-zqr6-a3ag" }, { "vulnerability": "VCID-ww2m-6691-yfa7" }, { "vulnerability": "VCID-xhcm-t8jb-ybfb" }, { "vulnerability": "VCID-ys5d-7xgp-w7g5" }, { "vulnerability": "VCID-zqx5-4rdk-1qa3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-10" } ], "aliases": [ "CVE-2015-5180" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vake-u1n1-x3hx" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-10" }