Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/glibc@2.31-13%2Bdeb11u6
Typedeb
Namespacedebian
Nameglibc
Version2.31-13+deb11u6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.36-8
Latest_non_vulnerable_version2.42-15
Affected_by_vulnerabilities
0
url VCID-3hqs-jns2-puf2
vulnerability_id VCID-3hqs-jns2-puf2
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33599
reference_id
reference_type
scores
0
value 0.00624
scoring_system epss
scoring_elements 0.70102
published_at 2026-04-02T12:55:00Z
1
value 0.00624
scoring_system epss
scoring_elements 0.70116
published_at 2026-04-04T12:55:00Z
2
value 0.00624
scoring_system epss
scoring_elements 0.70094
published_at 2026-04-07T12:55:00Z
3
value 0.00624
scoring_system epss
scoring_elements 0.70141
published_at 2026-04-08T12:55:00Z
4
value 0.00624
scoring_system epss
scoring_elements 0.70157
published_at 2026-04-09T12:55:00Z
5
value 0.00624
scoring_system epss
scoring_elements 0.7018
published_at 2026-04-11T12:55:00Z
6
value 0.00624
scoring_system epss
scoring_elements 0.70165
published_at 2026-04-12T12:55:00Z
7
value 0.00624
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-13T12:55:00Z
8
value 0.00624
scoring_system epss
scoring_elements 0.70196
published_at 2026-04-16T12:55:00Z
9
value 0.00624
scoring_system epss
scoring_elements 0.70205
published_at 2026-04-18T12:55:00Z
10
value 0.0087
scoring_system epss
scoring_elements 0.75216
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277202
reference_id 2277202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277202
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
reference_id GLIBC-SA-2024-0005
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0011/
reference_id ntap-20240524-0011
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url https://security.netapp.com/advisory/ntap-20240524-0011/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-d5xx-af6p-2fhn
3
vulnerability VCID-jswq-6ru6-wybc
4
vulnerability VCID-kukb-s61t-pbc3
5
vulnerability VCID-nwfb-xnks-1kg7
6
vulnerability VCID-ssnc-wdcf-sfc9
7
vulnerability VCID-tcpv-4crc-zuap
8
vulnerability VCID-us68-psx5-zude
9
vulnerability VCID-ys5d-7xgp-w7g5
10
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11
aliases CVE-2024-33599
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2
1
url VCID-bcuy-bbxf-x7hy
vulnerability_id VCID-bcuy-bbxf-x7hy
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33600
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.4522
published_at 2026-04-02T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45242
published_at 2026-04-04T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45185
published_at 2026-04-07T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.4524
published_at 2026-04-09T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-11T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45229
published_at 2026-04-12T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45231
published_at 2026-04-13T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45282
published_at 2026-04-16T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45276
published_at 2026-04-18T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54576
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277204
reference_id 2277204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277204
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
reference_id GLIBC-SA-2024-0006
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0013/
reference_id ntap-20240524-0013
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url https://security.netapp.com/advisory/ntap-20240524-0013/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-d5xx-af6p-2fhn
3
vulnerability VCID-jswq-6ru6-wybc
4
vulnerability VCID-kukb-s61t-pbc3
5
vulnerability VCID-nwfb-xnks-1kg7
6
vulnerability VCID-ssnc-wdcf-sfc9
7
vulnerability VCID-tcpv-4crc-zuap
8
vulnerability VCID-us68-psx5-zude
9
vulnerability VCID-ys5d-7xgp-w7g5
10
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11
aliases CVE-2024-33600
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy
2
url VCID-bsue-bznw-1ffe
vulnerability_id VCID-bsue-bznw-1ffe
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33601
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28523
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28566
published_at 2026-04-04T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28367
published_at 2026-04-07T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28433
published_at 2026-04-08T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28476
published_at 2026-04-09T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28479
published_at 2026-04-11T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28436
published_at 2026-04-12T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28387
published_at 2026-04-13T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28401
published_at 2026-04-16T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28379
published_at 2026-04-18T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34852
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277205
reference_id 2277205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277205
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
reference_id GLIBC-SA-2024-0007
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0014/
reference_id ntap-20240524-0014
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url https://security.netapp.com/advisory/ntap-20240524-0014/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-d5xx-af6p-2fhn
3
vulnerability VCID-jswq-6ru6-wybc
4
vulnerability VCID-kukb-s61t-pbc3
5
vulnerability VCID-nwfb-xnks-1kg7
6
vulnerability VCID-ssnc-wdcf-sfc9
7
vulnerability VCID-tcpv-4crc-zuap
8
vulnerability VCID-us68-psx5-zude
9
vulnerability VCID-ys5d-7xgp-w7g5
10
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11
aliases CVE-2024-33601
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe
3
url VCID-d5xx-af6p-2fhn
vulnerability_id VCID-d5xx-af6p-2fhn
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4802
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13253
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.1313
published_at 2026-04-21T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13218
published_at 2026-04-11T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13181
published_at 2026-04-12T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13129
published_at 2026-04-13T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13031
published_at 2026-04-16T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13033
published_at 2026-04-18T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13319
published_at 2026-04-04T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13117
published_at 2026-04-07T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13198
published_at 2026-04-08T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13249
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367468
reference_id 2367468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2367468
5
reference_url https://security.gentoo.org/glsa/202509-04
reference_id GLSA-202509-04
reference_type
scores
url https://security.gentoo.org/glsa/202509-04
6
reference_url https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
reference_id ?id=1e18586c5820e329f741d5c710275e165581380e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/
url https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
7
reference_url https://access.redhat.com/errata/RHSA-2025:10219
reference_id RHSA-2025:10219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10219
8
reference_url https://access.redhat.com/errata/RHSA-2025:10220
reference_id RHSA-2025:10220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10220
9
reference_url https://access.redhat.com/errata/RHSA-2025:10294
reference_id RHSA-2025:10294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10294
10
reference_url https://access.redhat.com/errata/RHSA-2025:11487
reference_id RHSA-2025:11487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11487
11
reference_url https://access.redhat.com/errata/RHSA-2025:8655
reference_id RHSA-2025:8655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8655
12
reference_url https://access.redhat.com/errata/RHSA-2025:8686
reference_id RHSA-2025:8686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8686
13
reference_url https://access.redhat.com/errata/RHSA-2025:9028
reference_id RHSA-2025:9028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9028
14
reference_url https://access.redhat.com/errata/RHSA-2025:9336
reference_id RHSA-2025:9336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9336
15
reference_url https://access.redhat.com/errata/RHSA-2025:9725
reference_id RHSA-2025:9725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9725
16
reference_url https://access.redhat.com/errata/RHSA-2025:9750
reference_id RHSA-2025:9750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9750
17
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32976
reference_id show_bug.cgi?id=32976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32976
18
reference_url https://usn.ubuntu.com/7541-1/
reference_id USN-7541-1
reference_type
scores
url https://usn.ubuntu.com/7541-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.36-8
purl pkg:deb/debian/glibc@2.36-8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8
aliases CVE-2025-4802
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn
4
url VCID-gv4u-g36a-w3cf
vulnerability_id VCID-gv4u-g36a-w3cf
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4911
reference_id
reference_type
scores
0
value 0.59128
scoring_system epss
scoring_elements 0.9822
published_at 2026-04-02T12:55:00Z
1
value 0.59128
scoring_system epss
scoring_elements 0.98223
published_at 2026-04-04T12:55:00Z
2
value 0.67392
scoring_system epss
scoring_elements 0.98574
published_at 2026-04-21T12:55:00Z
3
value 0.72535
scoring_system epss
scoring_elements 0.98763
published_at 2026-04-07T12:55:00Z
4
value 0.72771
scoring_system epss
scoring_elements 0.98771
published_at 2026-04-08T12:55:00Z
5
value 0.74256
scoring_system epss
scoring_elements 0.98844
published_at 2026-04-16T12:55:00Z
6
value 0.74256
scoring_system epss
scoring_elements 0.9884
published_at 2026-04-13T12:55:00Z
7
value 0.74256
scoring_system epss
scoring_elements 0.98837
published_at 2026-04-09T12:55:00Z
8
value 0.74256
scoring_system epss
scoring_elements 0.98839
published_at 2026-04-12T12:55:00Z
9
value 0.74256
scoring_system epss
scoring_elements 0.98845
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238352
reference_id 2238352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2238352
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
20
reference_url https://www.qualys.com/cve-2023-4911/
reference_id cve-2023-4911
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://www.qualys.com/cve-2023-4911/
21
reference_url https://access.redhat.com/security/cve/CVE-2023-4911
reference_id CVE-2023-4911
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/security/cve/CVE-2023-4911
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt
reference_id CVE-2023-4911
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt
23
reference_url https://security.gentoo.org/glsa/202310-03
reference_id GLSA-202310-03
reference_type
scores
url https://security.gentoo.org/glsa/202310-03
24
reference_url https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
reference_id looney-tunables-local-privilege-escalation-glibc-ld-so.txt
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
25
reference_url https://access.redhat.com/errata/RHSA-2023:5453
reference_id RHSA-2023:5453
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5453
26
reference_url https://access.redhat.com/errata/RHSA-2023:5454
reference_id RHSA-2023:5454
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5454
27
reference_url https://access.redhat.com/errata/RHSA-2023:5455
reference_id RHSA-2023:5455
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5455
28
reference_url https://access.redhat.com/errata/RHSA-2023:5476
reference_id RHSA-2023:5476
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5476
29
reference_url https://access.redhat.com/errata/RHSA-2024:0033
reference_id RHSA-2024:0033
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2024:0033
30
reference_url https://usn.ubuntu.com/6409-1/
reference_id USN-6409-1
reference_type
scores
url https://usn.ubuntu.com/6409-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-d5xx-af6p-2fhn
3
vulnerability VCID-jswq-6ru6-wybc
4
vulnerability VCID-kukb-s61t-pbc3
5
vulnerability VCID-nwfb-xnks-1kg7
6
vulnerability VCID-ssnc-wdcf-sfc9
7
vulnerability VCID-tcpv-4crc-zuap
8
vulnerability VCID-us68-psx5-zude
9
vulnerability VCID-ys5d-7xgp-w7g5
10
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11
aliases CVE-2023-4911
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf
5
url VCID-sjav-8bub-eycz
vulnerability_id VCID-sjav-8bub-eycz
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2961
reference_id
reference_type
scores
0
value 0.91755
scoring_system epss
scoring_elements 0.99689
published_at 2026-04-21T12:55:00Z
1
value 0.92156
scoring_system epss
scoring_elements 0.9971
published_at 2026-04-13T12:55:00Z
2
value 0.92156
scoring_system epss
scoring_elements 0.99712
published_at 2026-04-18T12:55:00Z
3
value 0.92156
scoring_system epss
scoring_elements 0.99711
published_at 2026-04-16T12:55:00Z
4
value 0.92156
scoring_system epss
scoring_elements 0.99707
published_at 2026-04-04T12:55:00Z
5
value 0.92156
scoring_system epss
scoring_elements 0.99709
published_at 2026-04-09T12:55:00Z
6
value 0.92578
scoring_system epss
scoring_elements 0.99739
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2961
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/1
reference_id 1
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191
reference_id 1069191
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191
6
reference_url http://www.openwall.com/lists/oss-security/2024/04/24/2
reference_id 2
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/04/24/2
7
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/2
reference_id 2
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/2
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2273404
reference_id 2273404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2273404
9
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/3
reference_id 3
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/3
10
reference_url http://www.openwall.com/lists/oss-security/2024/04/18/4
reference_id 4
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/04/18/4
11
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/4
reference_id 4
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/4
12
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/5
reference_id 5
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/5
13
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
14
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/6
reference_id 6
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/6
15
reference_url http://www.openwall.com/lists/oss-security/2024/04/17/9
reference_id 9
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/04/17/9
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
reference_id BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
17
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
reference_id GLIBC-SA-2024-0004
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
18
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
19
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
20
reference_url https://security.netapp.com/advisory/ntap-20240531-0002/
reference_id ntap-20240531-0002
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://security.netapp.com/advisory/ntap-20240531-0002/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
reference_id P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
22
reference_url https://access.redhat.com/errata/RHSA-2024:2722
reference_id RHSA-2024:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2722
23
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
24
reference_url https://access.redhat.com/errata/RHSA-2024:3269
reference_id RHSA-2024:3269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3269
25
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
26
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
27
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
28
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
29
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
30
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
31
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
32
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
33
reference_url https://access.redhat.com/errata/RHSA-2024:7590
reference_id RHSA-2024:7590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7590
34
reference_url https://access.redhat.com/errata/RHSA-2024:7594
reference_id RHSA-2024:7594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7594
35
reference_url https://access.redhat.com/errata/RHSA-2024:7599
reference_id RHSA-2024:7599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7599
36
reference_url https://access.redhat.com/errata/RHSA-2024:7939
reference_id RHSA-2024:7939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7939
37
reference_url https://access.redhat.com/errata/RHSA-2024:8235
reference_id RHSA-2024:8235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8235
38
reference_url https://usn.ubuntu.com/6737-1/
reference_id USN-6737-1
reference_type
scores
url https://usn.ubuntu.com/6737-1/
39
reference_url https://usn.ubuntu.com/6737-2/
reference_id USN-6737-2
reference_type
scores
url https://usn.ubuntu.com/6737-2/
40
reference_url https://usn.ubuntu.com/6762-1/
reference_id USN-6762-1
reference_type
scores
url https://usn.ubuntu.com/6762-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
reference_id YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-d5xx-af6p-2fhn
3
vulnerability VCID-jswq-6ru6-wybc
4
vulnerability VCID-kukb-s61t-pbc3
5
vulnerability VCID-nwfb-xnks-1kg7
6
vulnerability VCID-ssnc-wdcf-sfc9
7
vulnerability VCID-tcpv-4crc-zuap
8
vulnerability VCID-us68-psx5-zude
9
vulnerability VCID-ys5d-7xgp-w7g5
10
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11
aliases CVE-2024-2961
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz
6
url VCID-xhcm-t8jb-ybfb
vulnerability_id VCID-xhcm-t8jb-ybfb
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33602
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63607
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63633
published_at 2026-04-04T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63592
published_at 2026-04-07T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63644
published_at 2026-04-08T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63661
published_at 2026-04-09T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-11T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.6366
published_at 2026-04-12T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63627
published_at 2026-04-13T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63664
published_at 2026-04-16T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63673
published_at 2026-04-18T12:55:00Z
10
value 0.00627
scoring_system epss
scoring_elements 0.70258
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277206
reference_id 2277206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277206
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008
reference_id GLIBC-SA-2024-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0012/
reference_id ntap-20240524-0012
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url https://security.netapp.com/advisory/ntap-20240524-0012/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-d5xx-af6p-2fhn
3
vulnerability VCID-jswq-6ru6-wybc
4
vulnerability VCID-kukb-s61t-pbc3
5
vulnerability VCID-nwfb-xnks-1kg7
6
vulnerability VCID-ssnc-wdcf-sfc9
7
vulnerability VCID-tcpv-4crc-zuap
8
vulnerability VCID-us68-psx5-zude
9
vulnerability VCID-ys5d-7xgp-w7g5
10
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11
aliases CVE-2024-33602
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb
7
url VCID-ys5d-7xgp-w7g5
vulnerability_id VCID-ys5d-7xgp-w7g5
summary A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0395
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21846
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21685
published_at 2026-04-21T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21899
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21664
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21798
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21808
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21768
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-16T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21718
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/pipermail/libc-announce/2025/000044.html
reference_id 000044.html
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://sourceware.org/pipermail/libc-announce/2025/000044.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2339460
reference_id 2339460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2339460
6
reference_url https://www.openwall.com/lists/oss-security/2025/01/22/4
reference_id 4
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://www.openwall.com/lists/oss-security/2025/01/22/4
7
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
reference_id GLIBC-SA-2025-0001
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
8
reference_url https://security.gentoo.org/glsa/202505-06
reference_id GLSA-202505-06
reference_type
scores
url https://security.gentoo.org/glsa/202505-06
9
reference_url https://access.redhat.com/errata/RHSA-2025:3828
reference_id RHSA-2025:3828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3828
10
reference_url https://access.redhat.com/errata/RHSA-2025:4241
reference_id RHSA-2025:4241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4241
11
reference_url https://access.redhat.com/errata/RHSA-2025:4242
reference_id RHSA-2025:4242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4242
12
reference_url https://access.redhat.com/errata/RHSA-2025:4243
reference_id RHSA-2025:4243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4243
13
reference_url https://access.redhat.com/errata/RHSA-2025:4244
reference_id RHSA-2025:4244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4244
14
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32582
reference_id show_bug.cgi?id=32582
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32582
15
reference_url https://usn.ubuntu.com/7259-1/
reference_id USN-7259-1
reference_type
scores
url https://usn.ubuntu.com/7259-1/
16
reference_url https://usn.ubuntu.com/7259-2/
reference_id USN-7259-2
reference_type
scores
url https://usn.ubuntu.com/7259-2/
17
reference_url https://usn.ubuntu.com/7259-3/
reference_id USN-7259-3
reference_type
scores
url https://usn.ubuntu.com/7259-3/
fixed_packages
0
url pkg:deb/debian/glibc@2.36-8
purl pkg:deb/debian/glibc@2.36-8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8
aliases CVE-2025-0395
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u6