Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libextractor@1:0.5.23%2Bdfsg-7
Typedeb
Namespacedebian
Namelibextractor
Version1:0.5.23+dfsg-7
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:1.11-2
Latest_non_vulnerable_version1:1.11-2
Affected_by_vulnerabilities
0
url VCID-1xdm-2dj5-jkc7
vulnerability_id VCID-1xdm-2dj5-jkc7
summary security update
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14347
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68508
published_at 2026-04-18T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68494
published_at 2026-04-16T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68392
published_at 2026-04-01T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68412
published_at 2026-04-02T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68432
published_at 2026-04-04T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68408
published_at 2026-04-07T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68459
published_at 2026-04-08T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-09T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68501
published_at 2026-04-11T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68489
published_at 2026-04-12T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.68456
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14347
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
5
reference_url https://gnunet.org/bugs/view.php?id=5399
reference_id
reference_type
scores
url https://gnunet.org/bugs/view.php?id=5399
6
reference_url https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394
7
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
8
reference_url https://www.debian.org/security/2018/dsa-4290
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4290
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905
reference_id 904905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14347
reference_id CVE-2018-14347
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14347
14
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-14347
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdm-2dj5-jkc7
1
url VCID-2auw-wc6u-ekcs
vulnerability_id VCID-2auw-wc6u-ekcs
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20431
reference_id
reference_type
scores
0
value 0.00572
scoring_system epss
scoring_elements 0.68713
published_at 2026-04-18T12:55:00Z
1
value 0.00572
scoring_system epss
scoring_elements 0.6866
published_at 2026-04-13T12:55:00Z
2
value 0.00572
scoring_system epss
scoring_elements 0.68597
published_at 2026-04-01T12:55:00Z
3
value 0.00572
scoring_system epss
scoring_elements 0.68615
published_at 2026-04-02T12:55:00Z
4
value 0.00572
scoring_system epss
scoring_elements 0.68633
published_at 2026-04-04T12:55:00Z
5
value 0.00572
scoring_system epss
scoring_elements 0.6861
published_at 2026-04-07T12:55:00Z
6
value 0.00572
scoring_system epss
scoring_elements 0.68661
published_at 2026-04-08T12:55:00Z
7
value 0.00572
scoring_system epss
scoring_elements 0.68679
published_at 2026-04-09T12:55:00Z
8
value 0.00572
scoring_system epss
scoring_elements 0.68703
published_at 2026-04-16T12:55:00Z
9
value 0.00572
scoring_system epss
scoring_elements 0.68689
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20431
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
3
reference_url https://gnunet.org/bugs/view.php?id=5494
reference_id
reference_type
scores
url https://gnunet.org/bugs/view.php?id=5494
4
reference_url https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7
5
reference_url https://gnunet.org/git/libextractor.git/tree/ChangeLog
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/tree/ChangeLog
6
reference_url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
7
reference_url https://www.debian.org/security/2018/dsa-4361
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4361
8
reference_url http://www.securityfocus.com/bid/106300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106300
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213
reference_id 917213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20431
reference_id CVE-2018-20431
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20431
14
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-20431
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2auw-wc6u-ekcs
2
url VCID-3bg1-rwze-kuhw
vulnerability_id VCID-3bg1-rwze-kuhw
summary In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15601
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62742
published_at 2026-04-18T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62734
published_at 2026-04-16T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62587
published_at 2026-04-01T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62645
published_at 2026-04-02T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62677
published_at 2026-04-04T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62642
published_at 2026-04-07T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62694
published_at 2026-04-08T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.6271
published_at 2026-04-09T12:55:00Z
8
value 0.00432
scoring_system epss
scoring_elements 0.62729
published_at 2026-04-11T12:55:00Z
9
value 0.00432
scoring_system epss
scoring_elements 0.62718
published_at 2026-04-12T12:55:00Z
10
value 0.00432
scoring_system epss
scoring_elements 0.62695
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601
3
reference_url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
reference_id
reference_type
scores
url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
4
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15601
reference_id CVE-2017-15601
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15601
7
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15601
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bg1-rwze-kuhw
3
url VCID-5ymr-xk84-8uh3
vulnerability_id VCID-5ymr-xk84-8uh3
summary In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15602
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61241
published_at 2026-04-18T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61235
published_at 2026-04-16T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61073
published_at 2026-04-01T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61151
published_at 2026-04-02T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61179
published_at 2026-04-04T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61144
published_at 2026-04-07T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61192
published_at 2026-04-08T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61207
published_at 2026-04-09T12:55:00Z
8
value 0.00408
scoring_system epss
scoring_elements 0.61227
published_at 2026-04-11T12:55:00Z
9
value 0.00408
scoring_system epss
scoring_elements 0.61214
published_at 2026-04-12T12:55:00Z
10
value 0.00408
scoring_system epss
scoring_elements 0.61195
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602
3
reference_url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
reference_id
reference_type
scores
url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
4
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15602
reference_id CVE-2017-15602
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15602
7
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15602
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ymr-xk84-8uh3
4
url VCID-ahs6-mesc-yqhm
vulnerability_id VCID-ahs6-mesc-yqhm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20430
reference_id
reference_type
scores
0
value 0.0057
scoring_system epss
scoring_elements 0.68655
published_at 2026-04-18T12:55:00Z
1
value 0.0057
scoring_system epss
scoring_elements 0.68644
published_at 2026-04-16T12:55:00Z
2
value 0.0057
scoring_system epss
scoring_elements 0.68539
published_at 2026-04-01T12:55:00Z
3
value 0.0057
scoring_system epss
scoring_elements 0.68557
published_at 2026-04-02T12:55:00Z
4
value 0.0057
scoring_system epss
scoring_elements 0.68575
published_at 2026-04-04T12:55:00Z
5
value 0.0057
scoring_system epss
scoring_elements 0.68553
published_at 2026-04-07T12:55:00Z
6
value 0.0057
scoring_system epss
scoring_elements 0.68604
published_at 2026-04-08T12:55:00Z
7
value 0.0057
scoring_system epss
scoring_elements 0.68622
published_at 2026-04-09T12:55:00Z
8
value 0.0057
scoring_system epss
scoring_elements 0.68647
published_at 2026-04-11T12:55:00Z
9
value 0.0057
scoring_system epss
scoring_elements 0.68634
published_at 2026-04-12T12:55:00Z
10
value 0.0057
scoring_system epss
scoring_elements 0.68605
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20430
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
3
reference_url https://gnunet.org/bugs/view.php?id=5493
reference_id
reference_type
scores
url https://gnunet.org/bugs/view.php?id=5493
4
reference_url https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110
5
reference_url https://gnunet.org/git/libextractor.git/tree/ChangeLog
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/tree/ChangeLog
6
reference_url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
7
reference_url https://www.debian.org/security/2018/dsa-4361
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4361
8
reference_url http://www.securityfocus.com/bid/106300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106300
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214
reference_id 917214
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20430
reference_id CVE-2018-20430
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20430
14
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-20430
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahs6-mesc-yqhm
5
url VCID-bdsg-x852-wfgn
vulnerability_id VCID-bdsg-x852-wfgn
summary GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17440
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.67249
published_at 2026-04-13T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67284
published_at 2026-04-16T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67296
published_at 2026-04-18T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67278
published_at 2026-04-09T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67298
published_at 2026-04-11T12:55:00Z
5
value 0.01003
scoring_system epss
scoring_elements 0.76973
published_at 2026-04-07T12:55:00Z
6
value 0.01003
scoring_system epss
scoring_elements 0.76962
published_at 2026-04-02T12:55:00Z
7
value 0.01003
scoring_system epss
scoring_elements 0.76991
published_at 2026-04-04T12:55:00Z
8
value 0.01003
scoring_system epss
scoring_elements 0.76956
published_at 2026-04-01T12:55:00Z
9
value 0.01003
scoring_system epss
scoring_elements 0.77005
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17440
1
reference_url https://bugs.debian.org/883528#35
reference_id
reference_type
scores
url https://bugs.debian.org/883528#35
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440
3
reference_url https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e
4
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html
5
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html
6
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html
7
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html
8
reference_url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html
9
reference_url http://www.securityfocus.com/bid/102116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102116
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528
reference_id 883528
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528
11
reference_url https://security.archlinux.org/ASA-201807-16
reference_id ASA-201807-16
reference_type
scores
url https://security.archlinux.org/ASA-201807-16
12
reference_url https://security.archlinux.org/AVG-541
reference_id AVG-541
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-541
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17440
reference_id CVE-2017-17440
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17440
15
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-17440
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdsg-x852-wfgn
6
url VCID-kpcg-4av4-gka8
vulnerability_id VCID-kpcg-4av4-gka8
summary security update
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14346
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65862
published_at 2026-04-18T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65847
published_at 2026-04-16T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.6573
published_at 2026-04-01T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.6578
published_at 2026-04-02T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.65809
published_at 2026-04-04T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.65774
published_at 2026-04-07T12:55:00Z
6
value 0.00496
scoring_system epss
scoring_elements 0.65827
published_at 2026-04-08T12:55:00Z
7
value 0.00496
scoring_system epss
scoring_elements 0.65838
published_at 2026-04-09T12:55:00Z
8
value 0.00496
scoring_system epss
scoring_elements 0.65857
published_at 2026-04-11T12:55:00Z
9
value 0.00496
scoring_system epss
scoring_elements 0.65844
published_at 2026-04-12T12:55:00Z
10
value 0.00496
scoring_system epss
scoring_elements 0.65814
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14346
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
5
reference_url https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e
reference_id
reference_type
scores
url https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e
6
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html
7
reference_url https://www.debian.org/security/2018/dsa-4290
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4290
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903
reference_id 904903
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14346
reference_id CVE-2018-14346
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-14346
13
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-14346
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcg-4av4-gka8
7
url VCID-kxcz-d7a4-77e8
vulnerability_id VCID-kxcz-d7a4-77e8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16430
reference_id
reference_type
scores
0
value 0.01358
scoring_system epss
scoring_elements 0.80098
published_at 2026-04-01T12:55:00Z
1
value 0.01358
scoring_system epss
scoring_elements 0.80105
published_at 2026-04-02T12:55:00Z
2
value 0.01358
scoring_system epss
scoring_elements 0.80125
published_at 2026-04-04T12:55:00Z
3
value 0.01358
scoring_system epss
scoring_elements 0.80113
published_at 2026-04-07T12:55:00Z
4
value 0.01358
scoring_system epss
scoring_elements 0.80141
published_at 2026-04-08T12:55:00Z
5
value 0.01358
scoring_system epss
scoring_elements 0.80148
published_at 2026-04-09T12:55:00Z
6
value 0.01358
scoring_system epss
scoring_elements 0.80167
published_at 2026-04-11T12:55:00Z
7
value 0.01358
scoring_system epss
scoring_elements 0.80151
published_at 2026-04-12T12:55:00Z
8
value 0.01358
scoring_system epss
scoring_elements 0.80143
published_at 2026-04-13T12:55:00Z
9
value 0.01358
scoring_system epss
scoring_elements 0.80173
published_at 2026-04-16T12:55:00Z
10
value 0.01358
scoring_system epss
scoring_elements 0.80174
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16430
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987
reference_id 907987
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987
5
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
purl pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3
1
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2018-16430
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxcz-d7a4-77e8
8
url VCID-tc8j-82se-qfbk
vulnerability_id VCID-tc8j-82se-qfbk
summary In GNU Libextractor 1.4, there is an out-of-bounds read in the EXTRACTOR_dvi_extract_method function in plugins/dvi_extractor.c.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15922
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.39255
published_at 2026-04-18T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39231
published_at 2026-04-13T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39284
published_at 2026-04-16T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39077
published_at 2026-04-01T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39262
published_at 2026-04-02T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39286
published_at 2026-04-04T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.39204
published_at 2026-04-07T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39259
published_at 2026-04-08T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39275
published_at 2026-04-09T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39287
published_at 2026-04-11T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.39249
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922
3
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
4
reference_url http://www.securityfocus.com/bid/101595
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101595
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016
reference_id 880016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016
6
reference_url https://security.archlinux.org/ASA-201711-16
reference_id ASA-201711-16
reference_type
scores
url https://security.archlinux.org/ASA-201711-16
7
reference_url https://security.archlinux.org/AVG-471
reference_id AVG-471
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-471
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15922
reference_id CVE-2017-15922
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15922
10
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15922
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8j-82se-qfbk
9
url VCID-tubv-28uu-2uh8
vulnerability_id VCID-tubv-28uu-2uh8
summary GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15531
reference_id
reference_type
scores
0
value 0.01106
scoring_system epss
scoring_elements 0.78129
published_at 2026-04-18T12:55:00Z
1
value 0.01106
scoring_system epss
scoring_elements 0.78094
published_at 2026-04-13T12:55:00Z
2
value 0.01106
scoring_system epss
scoring_elements 0.78038
published_at 2026-04-01T12:55:00Z
3
value 0.01106
scoring_system epss
scoring_elements 0.78047
published_at 2026-04-02T12:55:00Z
4
value 0.01106
scoring_system epss
scoring_elements 0.78076
published_at 2026-04-04T12:55:00Z
5
value 0.01106
scoring_system epss
scoring_elements 0.78058
published_at 2026-04-07T12:55:00Z
6
value 0.01106
scoring_system epss
scoring_elements 0.78084
published_at 2026-04-08T12:55:00Z
7
value 0.01106
scoring_system epss
scoring_elements 0.78089
published_at 2026-04-09T12:55:00Z
8
value 0.01106
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-11T12:55:00Z
9
value 0.01106
scoring_system epss
scoring_elements 0.78097
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15531
1
reference_url https://bugs.gnunet.org/view.php?id=5846
reference_id
reference_type
scores
url https://bugs.gnunet.org/view.php?id=5846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531
3
reference_url https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html
4
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553
reference_id 935553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15531
reference_id CVE-2019-15531
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15531
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.11-2
purl pkg:deb/debian/libextractor@1:1.11-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.11-2
aliases CVE-2019-15531
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tubv-28uu-2uh8
10
url VCID-x3k6-yrp9-9ud9
vulnerability_id VCID-x3k6-yrp9-9ud9
summary In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html
1
reference_url http://openwall.com/lists/oss-security/2017/10/11/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/10/11/1
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15267
reference_id
reference_type
scores
0
value 0.0066
scoring_system epss
scoring_elements 0.71149
published_at 2026-04-18T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.71141
published_at 2026-04-16T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.71047
published_at 2026-04-01T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71056
published_at 2026-04-02T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71074
published_at 2026-04-04T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71048
published_at 2026-04-07T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71091
published_at 2026-04-08T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71103
published_at 2026-04-09T12:55:00Z
8
value 0.0066
scoring_system epss
scoring_elements 0.71126
published_at 2026-04-11T12:55:00Z
9
value 0.0066
scoring_system epss
scoring_elements 0.71112
published_at 2026-04-12T12:55:00Z
10
value 0.0066
scoring_system epss
scoring_elements 0.71095
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15267
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499600
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267
5
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
6
reference_url http://www.securityfocus.com/bid/101272
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101272
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
reference_id 878314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15267
reference_id CVE-2017-15267
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15267
10
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15267
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3k6-yrp9-9ud9
11
url VCID-xyab-d3gr-zkdw
vulnerability_id VCID-xyab-d3gr-zkdw
summary In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html
1
reference_url http://openwall.com/lists/oss-security/2017/10/11/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/10/11/1
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15266
reference_id
reference_type
scores
0
value 0.00363
scoring_system epss
scoring_elements 0.58461
published_at 2026-04-18T12:55:00Z
1
value 0.00363
scoring_system epss
scoring_elements 0.58456
published_at 2026-04-16T12:55:00Z
2
value 0.00363
scoring_system epss
scoring_elements 0.58308
published_at 2026-04-01T12:55:00Z
3
value 0.00363
scoring_system epss
scoring_elements 0.58393
published_at 2026-04-02T12:55:00Z
4
value 0.00363
scoring_system epss
scoring_elements 0.58413
published_at 2026-04-04T12:55:00Z
5
value 0.00363
scoring_system epss
scoring_elements 0.58387
published_at 2026-04-07T12:55:00Z
6
value 0.00363
scoring_system epss
scoring_elements 0.5844
published_at 2026-04-08T12:55:00Z
7
value 0.00363
scoring_system epss
scoring_elements 0.58446
published_at 2026-04-09T12:55:00Z
8
value 0.00363
scoring_system epss
scoring_elements 0.58463
published_at 2026-04-11T12:55:00Z
9
value 0.00363
scoring_system epss
scoring_elements 0.58443
published_at 2026-04-12T12:55:00Z
10
value 0.00363
scoring_system epss
scoring_elements 0.58424
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15266
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499599
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499599
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266
5
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
6
reference_url http://www.securityfocus.com/bid/101271
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101271
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
reference_id 878314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15266
reference_id CVE-2017-15266
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15266
10
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15266
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyab-d3gr-zkdw
12
url VCID-zd6d-q8xx-zud6
vulnerability_id VCID-zd6d-q8xx-zud6
summary In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.
references
0
reference_url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15600
reference_id
reference_type
scores
0
value 0.01659
scoring_system epss
scoring_elements 0.82093
published_at 2026-04-18T12:55:00Z
1
value 0.01659
scoring_system epss
scoring_elements 0.82058
published_at 2026-04-13T12:55:00Z
2
value 0.01659
scoring_system epss
scoring_elements 0.81993
published_at 2026-04-01T12:55:00Z
3
value 0.01659
scoring_system epss
scoring_elements 0.82005
published_at 2026-04-02T12:55:00Z
4
value 0.01659
scoring_system epss
scoring_elements 0.82027
published_at 2026-04-04T12:55:00Z
5
value 0.01659
scoring_system epss
scoring_elements 0.82022
published_at 2026-04-07T12:55:00Z
6
value 0.01659
scoring_system epss
scoring_elements 0.82049
published_at 2026-04-08T12:55:00Z
7
value 0.01659
scoring_system epss
scoring_elements 0.82056
published_at 2026-04-09T12:55:00Z
8
value 0.01659
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-11T12:55:00Z
9
value 0.01659
scoring_system epss
scoring_elements 0.82066
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15600
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501695
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600
4
reference_url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
reference_id
reference_type
scores
url https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz
5
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15600
reference_id CVE-2017-15600
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15600
8
reference_url https://usn.ubuntu.com/4641-1/
reference_id USN-4641-1
reference_type
scores
url https://usn.ubuntu.com/4641-1/
fixed_packages
0
url pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
purl pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tubv-28uu-2uh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1
aliases CVE-2017-15600
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zd6d-q8xx-zud6
Fixing_vulnerabilities
0
url VCID-xzye-g5rw-fyh5
vulnerability_id VCID-xzye-g5rw-fyh5
summary
Multiple vulnerabilities have been found in GraphicsMagick,
    allowing remote attackers to execute arbitrary code or cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26117
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26198
published_at 2026-04-02T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.2624
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26078
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2613
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26139
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31157
published_at 2026-04-12T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31113
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31146
published_at 2026-04-16T12:55:00Z
10
value 0.00121
scoring_system epss
scoring_elements 0.31126
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=537941
reference_id 537941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=537941
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
reference_id 559797
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
reference_id 559801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
reference_id 559806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
reference_id 559809
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
reference_id 559811
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
reference_id 559814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
reference_id 559815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
reference_id 559816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
reference_id 559819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
reference_id 559822
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
reference_id 559824
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
reference_id 559825
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
reference_id 559826
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
reference_id 559829
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
reference_id 559831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
reference_id 559832
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
reference_id 559833
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
reference_id 559834
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
reference_id 559835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
reference_id 559836
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
reference_id 559837
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
reference_id 559840
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
reference_id 559844
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
reference_id 559845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
reference_id 702436
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436
29
reference_url https://security.gentoo.org/glsa/201311-10
reference_id GLSA-201311-10
reference_type
scores
url https://security.gentoo.org/glsa/201311-10
30
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
31
reference_url https://access.redhat.com/errata/RHSA-2009:1646
reference_id RHSA-2009:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1646
32
reference_url https://access.redhat.com/errata/RHSA-2010:0039
reference_id RHSA-2010:0039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0039
fixed_packages
0
url pkg:deb/debian/libextractor@1:0.5.23%2Bdfsg-7
purl pkg:deb/debian/libextractor@1:0.5.23%2Bdfsg-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdm-2dj5-jkc7
1
vulnerability VCID-2auw-wc6u-ekcs
2
vulnerability VCID-3bg1-rwze-kuhw
3
vulnerability VCID-5ymr-xk84-8uh3
4
vulnerability VCID-ahs6-mesc-yqhm
5
vulnerability VCID-bdsg-x852-wfgn
6
vulnerability VCID-kpcg-4av4-gka8
7
vulnerability VCID-kxcz-d7a4-77e8
8
vulnerability VCID-tc8j-82se-qfbk
9
vulnerability VCID-tubv-28uu-2uh8
10
vulnerability VCID-x3k6-yrp9-9ud9
11
vulnerability VCID-xyab-d3gr-zkdw
12
vulnerability VCID-zd6d-q8xx-zud6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:0.5.23%252Bdfsg-7
aliases CVE-2009-3736
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzye-g5rw-fyh5
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:0.5.23%252Bdfsg-7