Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
Typedeb
Namespacedebian
Namelibraw
Version0.20.2-1+deb11u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version0.20.2-2.1+deb12u1
Latest_non_vulnerable_version0.20.2-2.1+deb12u1
Affected_by_vulnerabilities
0
url VCID-33xw-gu7q-3uht
vulnerability_id VCID-33xw-gu7q-3uht
summary LibRaw: Improper Validation of Specified Quantity in Input in LibRaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43964.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43964
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45617
published_at 2026-04-02T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45634
published_at 2026-04-21T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45584
published_at 2026-04-07T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45639
published_at 2026-04-13T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45638
published_at 2026-04-09T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.4566
published_at 2026-04-11T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45631
published_at 2026-04-12T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45689
published_at 2026-04-16T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45684
published_at 2026-04-18T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.45637
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43964
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43964
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
reference_id 0.21.3...0.21.4
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:12:15Z/
url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103783
reference_id 1103783
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103783
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2361287
reference_id 2361287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2361287
7
reference_url https://github.com/LibRaw/LibRaw/commit/a50dc3f1127d2e37a9b39f57ad9bb2ebb60f18c0
reference_id a50dc3f1127d2e37a9b39f57ad9bb2ebb60f18c0
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:12:15Z/
url https://github.com/LibRaw/LibRaw/commit/a50dc3f1127d2e37a9b39f57ad9bb2ebb60f18c0
8
reference_url https://www.libraw.org/news/libraw-0-21-4-release
reference_id libraw-0-21-4-release
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:12:15Z/
url https://www.libraw.org/news/libraw-0-21-4-release
9
reference_url https://usn.ubuntu.com/7485-1/
reference_id USN-7485-1
reference_type
scores
url https://usn.ubuntu.com/7485-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1
aliases CVE-2025-43964
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-33xw-gu7q-3uht
1
url VCID-88vk-c7wu-fffr
vulnerability_id VCID-88vk-c7wu-fffr
summary LibRaw: Out-of-Bounds Read in LibRaw's phase_one_correct Function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43962.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43962.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43962
reference_id
reference_type
scores
0
value 0.0031
scoring_system epss
scoring_elements 0.54155
published_at 2026-04-02T12:55:00Z
1
value 0.0031
scoring_system epss
scoring_elements 0.54243
published_at 2026-04-21T12:55:00Z
2
value 0.0031
scoring_system epss
scoring_elements 0.5416
published_at 2026-04-07T12:55:00Z
3
value 0.0031
scoring_system epss
scoring_elements 0.54212
published_at 2026-04-08T12:55:00Z
4
value 0.0031
scoring_system epss
scoring_elements 0.54208
published_at 2026-04-09T12:55:00Z
5
value 0.0031
scoring_system epss
scoring_elements 0.54258
published_at 2026-04-16T12:55:00Z
6
value 0.0031
scoring_system epss
scoring_elements 0.5424
published_at 2026-04-12T12:55:00Z
7
value 0.0031
scoring_system epss
scoring_elements 0.54219
published_at 2026-04-13T12:55:00Z
8
value 0.0031
scoring_system epss
scoring_elements 0.54262
published_at 2026-04-18T12:55:00Z
9
value 0.0031
scoring_system epss
scoring_elements 0.54185
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43962
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43962
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
reference_id 0.21.3...0.21.4
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:14:16Z/
url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103781
reference_id 1103781
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103781
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2361286
reference_id 2361286
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2361286
7
reference_url https://github.com/LibRaw/LibRaw/commit/66fe663e02a4dd610b4e832f5d9af326709336c2
reference_id 66fe663e02a4dd610b4e832f5d9af326709336c2
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:14:16Z/
url https://github.com/LibRaw/LibRaw/commit/66fe663e02a4dd610b4e832f5d9af326709336c2
8
reference_url https://www.libraw.org/news/libraw-0-21-4-release
reference_id libraw-0-21-4-release
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:14:16Z/
url https://www.libraw.org/news/libraw-0-21-4-release
9
reference_url https://usn.ubuntu.com/7485-1/
reference_id USN-7485-1
reference_type
scores
url https://usn.ubuntu.com/7485-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1
aliases CVE-2025-43962
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88vk-c7wu-fffr
2
url VCID-fbf4-mwnn-vqdp
vulnerability_id VCID-fbf4-mwnn-vqdp
summary LibRaw: out-of-buffer access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43963.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43963.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43963
reference_id
reference_type
scores
0
value 0.0031
scoring_system epss
scoring_elements 0.54155
published_at 2026-04-02T12:55:00Z
1
value 0.0031
scoring_system epss
scoring_elements 0.54243
published_at 2026-04-21T12:55:00Z
2
value 0.0031
scoring_system epss
scoring_elements 0.5416
published_at 2026-04-07T12:55:00Z
3
value 0.0031
scoring_system epss
scoring_elements 0.54212
published_at 2026-04-08T12:55:00Z
4
value 0.0031
scoring_system epss
scoring_elements 0.54208
published_at 2026-04-09T12:55:00Z
5
value 0.0031
scoring_system epss
scoring_elements 0.54258
published_at 2026-04-16T12:55:00Z
6
value 0.0031
scoring_system epss
scoring_elements 0.5424
published_at 2026-04-12T12:55:00Z
7
value 0.0031
scoring_system epss
scoring_elements 0.54219
published_at 2026-04-13T12:55:00Z
8
value 0.0031
scoring_system epss
scoring_elements 0.54262
published_at 2026-04-18T12:55:00Z
9
value 0.0031
scoring_system epss
scoring_elements 0.54185
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43963
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43963
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
reference_id 0.21.3...0.21.4
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:13:31Z/
url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103782
reference_id 1103782
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103782
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2361288
reference_id 2361288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2361288
7
reference_url https://github.com/LibRaw/LibRaw/commit/be26e7639ecf8beb55f124ce780e99842de2e964
reference_id be26e7639ecf8beb55f124ce780e99842de2e964
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:13:31Z/
url https://github.com/LibRaw/LibRaw/commit/be26e7639ecf8beb55f124ce780e99842de2e964
8
reference_url https://www.libraw.org/news/libraw-0-21-4-release
reference_id libraw-0-21-4-release
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:13:31Z/
url https://www.libraw.org/news/libraw-0-21-4-release
9
reference_url https://usn.ubuntu.com/7485-1/
reference_id USN-7485-1
reference_type
scores
url https://usn.ubuntu.com/7485-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1
aliases CVE-2025-43963
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fbf4-mwnn-vqdp
3
url VCID-y455-nxwt-7ygd
vulnerability_id VCID-y455-nxwt-7ygd
summary LibRaw: Out-of-Bounds Read in Fujifilm 0xf00c Tag Parser in LibRaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43961.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43961.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43961
reference_id
reference_type
scores
0
value 0.0031
scoring_system epss
scoring_elements 0.54155
published_at 2026-04-02T12:55:00Z
1
value 0.0031
scoring_system epss
scoring_elements 0.54243
published_at 2026-04-21T12:55:00Z
2
value 0.0031
scoring_system epss
scoring_elements 0.5416
published_at 2026-04-07T12:55:00Z
3
value 0.0031
scoring_system epss
scoring_elements 0.54212
published_at 2026-04-08T12:55:00Z
4
value 0.0031
scoring_system epss
scoring_elements 0.54208
published_at 2026-04-09T12:55:00Z
5
value 0.0031
scoring_system epss
scoring_elements 0.54258
published_at 2026-04-16T12:55:00Z
6
value 0.0031
scoring_system epss
scoring_elements 0.5424
published_at 2026-04-12T12:55:00Z
7
value 0.0031
scoring_system epss
scoring_elements 0.54219
published_at 2026-04-13T12:55:00Z
8
value 0.0031
scoring_system epss
scoring_elements 0.54262
published_at 2026-04-18T12:55:00Z
9
value 0.0031
scoring_system epss
scoring_elements 0.54185
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43961
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43961
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
reference_id 0.21.3...0.21.4
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:14:46Z/
url https://github.com/LibRaw/LibRaw/compare/0.21.3...0.21.4
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103781
reference_id 1103781
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103781
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2361283
reference_id 2361283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2361283
7
reference_url https://github.com/LibRaw/LibRaw/commit/66fe663e02a4dd610b4e832f5d9af326709336c2
reference_id 66fe663e02a4dd610b4e832f5d9af326709336c2
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:14:46Z/
url https://github.com/LibRaw/LibRaw/commit/66fe663e02a4dd610b4e832f5d9af326709336c2
8
reference_url https://www.libraw.org/news/libraw-0-21-4-release
reference_id libraw-0-21-4-release
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T02:14:46Z/
url https://www.libraw.org/news/libraw-0-21-4-release
9
reference_url https://usn.ubuntu.com/7485-1/
reference_id USN-7485-1
reference_type
scores
url https://usn.ubuntu.com/7485-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1
aliases CVE-2025-43961
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y455-nxwt-7ygd
Fixing_vulnerabilities
0
url VCID-25js-gs2n-jbfb
vulnerability_id VCID-25js-gs2n-jbfb
summary LibRaw: Out-of-bounds read in LibRaw::adobe_copy_pixel() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35533.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35533
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08119
published_at 2026-04-01T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08178
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08233
published_at 2026-04-04T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08182
published_at 2026-04-07T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08246
published_at 2026-04-08T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08265
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08257
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08237
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0822
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08114
published_at 2026-04-16T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.081
published_at 2026-04-18T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08261
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35533
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122358
reference_id 2122358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122358
5
reference_url https://usn.ubuntu.com/5715-1/
reference_id USN-5715-1
reference_type
scores
url https://usn.ubuntu.com/5715-1/
6
reference_url https://usn.ubuntu.com/7266-1/
reference_id USN-7266-1
reference_type
scores
url https://usn.ubuntu.com/7266-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-35533
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-25js-gs2n-jbfb
1
url VCID-43af-u5hy-afcg
vulnerability_id VCID-43af-u5hy-afcg
summary LibRaw: Out-of-bounds read in simple_decode_row() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35532.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35532
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08119
published_at 2026-04-01T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08178
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08233
published_at 2026-04-04T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08182
published_at 2026-04-07T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08246
published_at 2026-04-08T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08265
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08257
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08237
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0822
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08114
published_at 2026-04-16T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.081
published_at 2026-04-18T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08261
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35532
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35532
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122357
reference_id 2122357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122357
5
reference_url https://usn.ubuntu.com/5715-1/
reference_id USN-5715-1
reference_type
scores
url https://usn.ubuntu.com/5715-1/
6
reference_url https://usn.ubuntu.com/7266-1/
reference_id USN-7266-1
reference_type
scores
url https://usn.ubuntu.com/7266-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-35532
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-43af-u5hy-afcg
2
url VCID-54h1-vj6r-4ue5
vulnerability_id VCID-54h1-vj6r-4ue5
summary LibRaw: Out-of-bounds read in LibRaw::parseSonySRF() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35535.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35535
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14676
published_at 2026-04-12T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14726
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.148
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14606
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14695
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14754
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14714
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14622
published_at 2026-04-13T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14513
published_at 2026-04-16T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14519
published_at 2026-04-18T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14585
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35535
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35535
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122362
reference_id 2122362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122362
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-35535
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54h1-vj6r-4ue5
3
url VCID-aa14-ypvj-pfen
vulnerability_id VCID-aa14-ypvj-pfen
summary
Out-of-bounds Write
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32142.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32142
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06284
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06317
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06493
published_at 2026-04-21T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0635
published_at 2026-04-04T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0633
published_at 2026-04-07T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06378
published_at 2026-04-08T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.0642
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06412
published_at 2026-04-11T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06406
published_at 2026-04-12T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06395
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06335
published_at 2026-04-16T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06346
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32142
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1729
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/gtt1995
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://github.com/gtt1995
6
reference_url https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49
7
reference_url https://github.com/LibRaw/LibRaw/issues/400
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://github.com/LibRaw/LibRaw/issues/400
8
reference_url https://www.libraw.org/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://www.libraw.org/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031790
reference_id 1031790
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031790
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2172004
reference_id 2172004
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2172004
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/
reference_id 5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-32142
reference_id CVE-2021-32142
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-32142
13
reference_url https://www.debian.org/security/2023/dsa-5412
reference_id dsa-5412
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://www.debian.org/security/2023/dsa-5412
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/
reference_id E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/
15
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-19T14:14:57Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html
16
reference_url https://access.redhat.com/errata/RHSA-2023:6343
reference_id RHSA-2023:6343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6343
17
reference_url https://access.redhat.com/errata/RHSA-2024:0343
reference_id RHSA-2024:0343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0343
18
reference_url https://access.redhat.com/errata/RHSA-2024:2994
reference_id RHSA-2024:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2994
19
reference_url https://usn.ubuntu.com/6137-1/
reference_id USN-6137-1
reference_type
scores
url https://usn.ubuntu.com/6137-1/
20
reference_url https://usn.ubuntu.com/7266-1/
reference_id USN-7266-1
reference_type
scores
url https://usn.ubuntu.com/7266-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2021-32142
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aa14-ypvj-pfen
4
url VCID-abzn-gut6-y3cz
vulnerability_id VCID-abzn-gut6-y3cz
summary
Multiple vulnerabilities have been found in LibRaw, the worst of
    which may allow attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24889.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24889.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24889
reference_id
reference_type
scores
0
value 0.00931
scoring_system epss
scoring_elements 0.76051
published_at 2026-04-01T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.76054
published_at 2026-04-02T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76086
published_at 2026-04-04T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.76067
published_at 2026-04-07T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.761
published_at 2026-04-08T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76114
published_at 2026-04-09T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.7614
published_at 2026-04-21T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76115
published_at 2026-04-12T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76113
published_at 2026-04-13T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.76154
published_at 2026-04-16T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.76157
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24889
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24889
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibRaw/LibRaw/issues/334
reference_id
reference_type
scores
url https://github.com/LibRaw/LibRaw/issues/334
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1882339
reference_id 1882339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1882339
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-24889
reference_id CVE-2020-24889
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-24889
7
reference_url https://security.gentoo.org/glsa/202010-05
reference_id GLSA-202010-05
reference_type
scores
url https://security.gentoo.org/glsa/202010-05
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-24889
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abzn-gut6-y3cz
5
url VCID-cx7p-nhr2-v3ay
vulnerability_id VCID-cx7p-nhr2-v3ay
summary LibRaw: Memory corruption in "crxFreeSubbandData()" function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35534.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35534
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36141
published_at 2026-04-01T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36337
published_at 2026-04-02T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.3637
published_at 2026-04-04T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36205
published_at 2026-04-07T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36254
published_at 2026-04-08T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.36273
published_at 2026-04-09T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36278
published_at 2026-04-11T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36241
published_at 2026-04-12T12:55:00Z
8
value 0.00155
scoring_system epss
scoring_elements 0.36217
published_at 2026-04-13T12:55:00Z
9
value 0.00155
scoring_system epss
scoring_elements 0.3626
published_at 2026-04-16T12:55:00Z
10
value 0.00155
scoring_system epss
scoring_elements 0.36244
published_at 2026-04-18T12:55:00Z
11
value 0.00155
scoring_system epss
scoring_elements 0.36192
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122360
reference_id 2122360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122360
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-35534
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cx7p-nhr2-v3ay
6
url VCID-hqh8-vz5n-23c9
vulnerability_id VCID-hqh8-vz5n-23c9
summary libraw: Out of bounds read in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-22628.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-22628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-22628
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25313
published_at 2026-04-09T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25386
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.252
published_at 2026-04-21T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25283
published_at 2026-04-12T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.2523
published_at 2026-04-18T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.2524
published_at 2026-04-16T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25422
published_at 2026-04-04T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25198
published_at 2026-04-07T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25268
published_at 2026-04-08T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25324
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-22628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22628
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234992
reference_id 2234992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234992
5
reference_url https://github.com/LibRaw/LibRaw/issues/269
reference_id 269
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T18:03:55Z/
url https://github.com/LibRaw/LibRaw/issues/269
6
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T18:03:55Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html
7
reference_url https://usn.ubuntu.com/6377-1/
reference_id USN-6377-1
reference_type
scores
url https://usn.ubuntu.com/6377-1/
8
reference_url https://usn.ubuntu.com/7266-1/
reference_id USN-7266-1
reference_type
scores
url https://usn.ubuntu.com/7266-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-22628
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hqh8-vz5n-23c9
7
url VCID-n9u1-b4b8-sqft
vulnerability_id VCID-n9u1-b4b8-sqft
summary LibRaw: Out of bounds write in new_node() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35530.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35530
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08119
published_at 2026-04-01T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08178
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08233
published_at 2026-04-04T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08182
published_at 2026-04-07T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08246
published_at 2026-04-08T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08265
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08257
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08237
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0822
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08114
published_at 2026-04-16T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.081
published_at 2026-04-18T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08261
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35530
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122339
reference_id 2122339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122339
5
reference_url https://usn.ubuntu.com/5715-1/
reference_id USN-5715-1
reference_type
scores
url https://usn.ubuntu.com/5715-1/
6
reference_url https://usn.ubuntu.com/7266-1/
reference_id USN-7266-1
reference_type
scores
url https://usn.ubuntu.com/7266-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-35530
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n9u1-b4b8-sqft
8
url VCID-npjj-h25x-c7ge
vulnerability_id VCID-npjj-h25x-c7ge
summary LibRaw: Out-of-bounds read in get_huffman_diff() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35531.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35531
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08119
published_at 2026-04-01T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08178
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08233
published_at 2026-04-04T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08182
published_at 2026-04-07T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08246
published_at 2026-04-08T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08265
published_at 2026-04-09T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08257
published_at 2026-04-11T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08237
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.0822
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08114
published_at 2026-04-16T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.081
published_at 2026-04-18T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08261
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35531
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122356
reference_id 2122356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122356
4
reference_url https://usn.ubuntu.com/5715-1/
reference_id USN-5715-1
reference_type
scores
url https://usn.ubuntu.com/5715-1/
5
reference_url https://usn.ubuntu.com/7266-1/
reference_id USN-7266-1
reference_type
scores
url https://usn.ubuntu.com/7266-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-35531
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npjj-h25x-c7ge
9
url VCID-pnd8-8z2d-4bh3
vulnerability_id VCID-pnd8-8z2d-4bh3
summary LibRaw: lack of thumbnail size range check can lead to buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15503.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15503
reference_id
reference_type
scores
0
value 0.0387
scoring_system epss
scoring_elements 0.88169
published_at 2026-04-01T12:55:00Z
1
value 0.0387
scoring_system epss
scoring_elements 0.88178
published_at 2026-04-02T12:55:00Z
2
value 0.0387
scoring_system epss
scoring_elements 0.88194
published_at 2026-04-04T12:55:00Z
3
value 0.0387
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-07T12:55:00Z
4
value 0.0387
scoring_system epss
scoring_elements 0.88219
published_at 2026-04-08T12:55:00Z
5
value 0.0387
scoring_system epss
scoring_elements 0.88225
published_at 2026-04-09T12:55:00Z
6
value 0.0387
scoring_system epss
scoring_elements 0.88236
published_at 2026-04-11T12:55:00Z
7
value 0.0387
scoring_system epss
scoring_elements 0.88229
published_at 2026-04-12T12:55:00Z
8
value 0.0387
scoring_system epss
scoring_elements 0.88228
published_at 2026-04-13T12:55:00Z
9
value 0.0387
scoring_system epss
scoring_elements 0.88242
published_at 2026-04-16T12:55:00Z
10
value 0.0387
scoring_system epss
scoring_elements 0.88241
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853477
reference_id 1853477
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853477
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964747
reference_id 964747
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964747
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15503
reference_id CVE-2020-15503
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-15503
7
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
8
reference_url https://usn.ubuntu.com/5715-1/
reference_id USN-5715-1
reference_type
scores
url https://usn.ubuntu.com/5715-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-15503
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnd8-8z2d-4bh3
10
url VCID-th8h-py4c-47da
vulnerability_id VCID-th8h-py4c-47da
summary
Out-of-bounds Write
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1729.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1729
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19558
published_at 2026-04-02T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19604
published_at 2026-04-04T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19325
published_at 2026-04-07T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19403
published_at 2026-04-08T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19454
published_at 2026-04-09T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19459
published_at 2026-04-11T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19411
published_at 2026-04-12T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19354
published_at 2026-04-13T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19315
published_at 2026-04-16T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19322
published_at 2026-04-18T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19336
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1729
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188240
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188240
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1729
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/LibRaw/LibRaw/issues/557
reference_id
reference_type
scores
url https://github.com/LibRaw/LibRaw/issues/557
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036281
reference_id 1036281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036281
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-1729
reference_id CVE-2023-1729
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-1729
11
reference_url https://security.gentoo.org/glsa/202312-08
reference_id GLSA-202312-08
reference_type
scores
url https://security.gentoo.org/glsa/202312-08
12
reference_url https://access.redhat.com/errata/RHSA-2024:2137
reference_id RHSA-2024:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2137
13
reference_url https://usn.ubuntu.com/6137-1/
reference_id USN-6137-1
reference_type
scores
url https://usn.ubuntu.com/6137-1/
14
reference_url https://usn.ubuntu.com/7266-1/
reference_id USN-7266-1
reference_type
scores
url https://usn.ubuntu.com/7266-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2023-1729
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-th8h-py4c-47da
11
url VCID-urry-mwtn-9ua4
vulnerability_id VCID-urry-mwtn-9ua4
summary A buffer overread in LibRaw might allow an attacker to cause denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24870.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24870
reference_id
reference_type
scores
0
value 0.00581
scoring_system epss
scoring_elements 0.68831
published_at 2026-04-01T12:55:00Z
1
value 0.00581
scoring_system epss
scoring_elements 0.68849
published_at 2026-04-02T12:55:00Z
2
value 0.00581
scoring_system epss
scoring_elements 0.6887
published_at 2026-04-04T12:55:00Z
3
value 0.00581
scoring_system epss
scoring_elements 0.6885
published_at 2026-04-07T12:55:00Z
4
value 0.00581
scoring_system epss
scoring_elements 0.689
published_at 2026-04-08T12:55:00Z
5
value 0.00581
scoring_system epss
scoring_elements 0.68919
published_at 2026-04-09T12:55:00Z
6
value 0.00581
scoring_system epss
scoring_elements 0.68942
published_at 2026-04-11T12:55:00Z
7
value 0.00581
scoring_system epss
scoring_elements 0.68927
published_at 2026-04-12T12:55:00Z
8
value 0.00581
scoring_system epss
scoring_elements 0.68898
published_at 2026-04-13T12:55:00Z
9
value 0.00581
scoring_system epss
scoring_elements 0.68939
published_at 2026-04-16T12:55:00Z
10
value 0.00581
scoring_system epss
scoring_elements 0.68949
published_at 2026-04-18T12:55:00Z
11
value 0.00581
scoring_system epss
scoring_elements 0.68928
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24870
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1928794
reference_id 1928794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1928794
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-24870
reference_id CVE-2020-24870
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-24870
5
reference_url https://security.gentoo.org/glsa/202208-07
reference_id GLSA-202208-07
reference_type
scores
url https://security.gentoo.org/glsa/202208-07
6
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
fixed_packages
0
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-33xw-gu7q-3uht
1
vulnerability VCID-88vk-c7wu-fffr
2
vulnerability VCID-fbf4-mwnn-vqdp
3
vulnerability VCID-y455-nxwt-7ygd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1
aliases CVE-2020-24870
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-urry-mwtn-9ua4
Risk_score1.3
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1