Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ht@0.5.0-1
Typedeb
Namespacedebian
Nameht
Version0.5.0-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.1.0+repack1-2
Latest_non_vulnerable_version2.1.0+repack1-2
Affected_by_vulnerabilities
0
url VCID-1bz7-thv9-cyc6
vulnerability_id VCID-1bz7-thv9-cyc6
summary gcc: Invalid write due to a use-after-free to array ktypevec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4488.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4488.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4488
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62773
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62831
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62861
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62892
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62899
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62877
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62918
published_at 2026-04-16T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.62926
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333332
reference_id 1333332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333332
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4488
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bz7-thv9-cyc6
1
url VCID-3nmz-ds53-y3fq
vulnerability_id VCID-3nmz-ds53-y3fq
summary
Two vulnerabilities have been discovered in HT Editor, potentially leading
    to the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1546
reference_id
reference_type
scores
0
value 0.02908
scoring_system epss
scoring_elements 0.86386
published_at 2026-04-18T12:55:00Z
1
value 0.02908
scoring_system epss
scoring_elements 0.86302
published_at 2026-04-01T12:55:00Z
2
value 0.02908
scoring_system epss
scoring_elements 0.86312
published_at 2026-04-02T12:55:00Z
3
value 0.02908
scoring_system epss
scoring_elements 0.8633
published_at 2026-04-04T12:55:00Z
4
value 0.02908
scoring_system epss
scoring_elements 0.86331
published_at 2026-04-07T12:55:00Z
5
value 0.02908
scoring_system epss
scoring_elements 0.86349
published_at 2026-04-08T12:55:00Z
6
value 0.02908
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-09T12:55:00Z
7
value 0.02908
scoring_system epss
scoring_elements 0.86372
published_at 2026-04-11T12:55:00Z
8
value 0.02908
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-12T12:55:00Z
9
value 0.02908
scoring_system epss
scoring_elements 0.86365
published_at 2026-04-13T12:55:00Z
10
value 0.02908
scoring_system epss
scoring_elements 0.86382
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1546
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1546
2
reference_url http://www.debian.org/security/2005/dsa-743
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-743
3
reference_url http://www.gentoo.org/security/en/glsa/glsa-200505-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200505-08.xml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=308587
reference_id 308587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=308587
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.991:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.3.991:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.991:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.992:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.3.992:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.992:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4b:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4c:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4d:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.6.0b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0b:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:2000-01-14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:2000-01-14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:2000-01-14:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1546
reference_id CVE-2005-1546
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1546
28
reference_url https://security.gentoo.org/glsa/200505-08
reference_id GLSA-200505-08
reference_type
scores
url https://security.gentoo.org/glsa/200505-08
fixed_packages
0
url pkg:deb/debian/ht@0.9.1-4
purl pkg:deb/debian/ht@0.9.1-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bz7-thv9-cyc6
1
vulnerability VCID-aamn-9dtp-6fg6
2
vulnerability VCID-cd45-a3xv-6uhw
3
vulnerability VCID-juv3-bucu-efhy
4
vulnerability VCID-nxer-a1h8-gfek
5
vulnerability VCID-sgrx-ndrs-nqdg
6
vulnerability VCID-w77d-kbu4-gud8
7
vulnerability VCID-xa12-b129-gkb9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@0.9.1-4
aliases CVE-2005-1546
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nmz-ds53-y3fq
2
url VCID-8xvb-qdc3-vfbj
vulnerability_id VCID-8xvb-qdc3-vfbj
summary
Two vulnerabilities have been discovered in HT Editor, potentially leading
    to the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1545
reference_id
reference_type
scores
0
value 0.02908
scoring_system epss
scoring_elements 0.86386
published_at 2026-04-18T12:55:00Z
1
value 0.02908
scoring_system epss
scoring_elements 0.86302
published_at 2026-04-01T12:55:00Z
2
value 0.02908
scoring_system epss
scoring_elements 0.86312
published_at 2026-04-02T12:55:00Z
3
value 0.02908
scoring_system epss
scoring_elements 0.8633
published_at 2026-04-04T12:55:00Z
4
value 0.02908
scoring_system epss
scoring_elements 0.86331
published_at 2026-04-07T12:55:00Z
5
value 0.02908
scoring_system epss
scoring_elements 0.86349
published_at 2026-04-08T12:55:00Z
6
value 0.02908
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-09T12:55:00Z
7
value 0.02908
scoring_system epss
scoring_elements 0.86372
published_at 2026-04-11T12:55:00Z
8
value 0.02908
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-12T12:55:00Z
9
value 0.02908
scoring_system epss
scoring_elements 0.86365
published_at 2026-04-13T12:55:00Z
10
value 0.02908
scoring_system epss
scoring_elements 0.86382
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1545
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1545
2
reference_url http://www.debian.org/security/2005/dsa-743
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-743
3
reference_url http://www.gentoo.org/security/en/glsa/glsa-200505-08.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200505-08.xml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=308587
reference_id 308587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=308587
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.991:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.3.991:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.991:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.992:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.3.992:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.3.992:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4b:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4c:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.4d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.4d:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.4.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.6.0b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.6.0b:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.7.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:0.8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:2000-01-14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ht_editor:ht_editor:2000-01-14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ht_editor:ht_editor:2000-01-14:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1545
reference_id CVE-2005-1545
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1545
28
reference_url https://security.gentoo.org/glsa/200505-08
reference_id GLSA-200505-08
reference_type
scores
url https://security.gentoo.org/glsa/200505-08
fixed_packages
0
url pkg:deb/debian/ht@0.9.1-4
purl pkg:deb/debian/ht@0.9.1-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bz7-thv9-cyc6
1
vulnerability VCID-aamn-9dtp-6fg6
2
vulnerability VCID-cd45-a3xv-6uhw
3
vulnerability VCID-juv3-bucu-efhy
4
vulnerability VCID-nxer-a1h8-gfek
5
vulnerability VCID-sgrx-ndrs-nqdg
6
vulnerability VCID-w77d-kbu4-gud8
7
vulnerability VCID-xa12-b129-gkb9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@0.9.1-4
aliases CVE-2005-1545
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8xvb-qdc3-vfbj
3
url VCID-aamn-9dtp-6fg6
vulnerability_id VCID-aamn-9dtp-6fg6
summary gcc: Read access violations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4493.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4493
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63166
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63225
published_at 2026-04-02T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63255
published_at 2026-04-04T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.6322
published_at 2026-04-07T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63272
published_at 2026-04-08T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63289
published_at 2026-04-09T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-11T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.6329
published_at 2026-04-12T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63254
published_at 2026-04-13T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63291
published_at 2026-04-16T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63298
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333383
reference_id 1333383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333383
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4493
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aamn-9dtp-6fg6
4
url VCID-cd45-a3xv-6uhw
vulnerability_id VCID-cd45-a3xv-6uhw
summary gcc: Read access violations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4492.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4492
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.44976
published_at 2026-04-01T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45057
published_at 2026-04-02T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45079
published_at 2026-04-04T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45021
published_at 2026-04-07T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45073
published_at 2026-04-09T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45095
published_at 2026-04-11T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45063
published_at 2026-04-12T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45065
published_at 2026-04-13T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45113
published_at 2026-04-16T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.45107
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333377
reference_id 1333377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333377
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4492
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd45-a3xv-6uhw
5
url VCID-juv3-bucu-efhy
vulnerability_id VCID-juv3-bucu-efhy
summary gcc: Exploitable buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2226.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2226
reference_id
reference_type
scores
0
value 0.09327
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-01T12:55:00Z
1
value 0.09327
scoring_system epss
scoring_elements 0.92736
published_at 2026-04-02T12:55:00Z
2
value 0.09327
scoring_system epss
scoring_elements 0.92742
published_at 2026-04-04T12:55:00Z
3
value 0.09327
scoring_system epss
scoring_elements 0.9274
published_at 2026-04-07T12:55:00Z
4
value 0.09327
scoring_system epss
scoring_elements 0.92749
published_at 2026-04-08T12:55:00Z
5
value 0.09327
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-09T12:55:00Z
6
value 0.09327
scoring_system epss
scoring_elements 0.92759
published_at 2026-04-11T12:55:00Z
7
value 0.09327
scoring_system epss
scoring_elements 0.92758
published_at 2026-04-13T12:55:00Z
8
value 0.09327
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2226
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333322
reference_id 1333322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333322
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
reference_id CVE-2016-2226
reference_type exploit
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42386.txt
reference_id CVE-2016-2226
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42386.txt
9
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
10
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
11
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
12
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-2226
risk_score 6.8
exploitability 2.0
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juv3-bucu-efhy
6
url VCID-nxer-a1h8-gfek
vulnerability_id VCID-nxer-a1h8-gfek
summary gcc: Invalid write due to integer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4489.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4489
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62773
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62831
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62861
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62892
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62899
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62877
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62918
published_at 2026-04-16T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.62926
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333336
reference_id 1333336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333336
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4489
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxer-a1h8-gfek
7
url VCID-sgrx-ndrs-nqdg
vulnerability_id VCID-sgrx-ndrs-nqdg
summary gcc: Invalid write due to a use-after-free to array btypevec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4487.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4487
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30969
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31094
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31141
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31015
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31044
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31051
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31007
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30962
published_at 2026-04-13T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30993
published_at 2026-04-16T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.30975
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333330
reference_id 1333330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333330
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4487
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgrx-ndrs-nqdg
8
url VCID-w77d-kbu4-gud8
vulnerability_id VCID-w77d-kbu4-gud8
summary gcc,gdb,binutils,libitm: Stack overflow vulnerability in libiberty demangler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6131.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6131
reference_id
reference_type
scores
0
value 0.0176
scoring_system epss
scoring_elements 0.82537
published_at 2026-04-01T12:55:00Z
1
value 0.0176
scoring_system epss
scoring_elements 0.82639
published_at 2026-04-18T12:55:00Z
2
value 0.0176
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-13T12:55:00Z
3
value 0.0176
scoring_system epss
scoring_elements 0.82638
published_at 2026-04-16T12:55:00Z
4
value 0.0176
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-02T12:55:00Z
5
value 0.0176
scoring_system epss
scoring_elements 0.82566
published_at 2026-04-04T12:55:00Z
6
value 0.0176
scoring_system epss
scoring_elements 0.82562
published_at 2026-04-07T12:55:00Z
7
value 0.0176
scoring_system epss
scoring_elements 0.82588
published_at 2026-04-08T12:55:00Z
8
value 0.0176
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-09T12:55:00Z
9
value 0.0176
scoring_system epss
scoring_elements 0.82614
published_at 2026-04-11T12:55:00Z
10
value 0.0176
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1352068
reference_id 1352068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1352068
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840889
reference_id 840889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840889
6
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
7
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
8
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-6131
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w77d-kbu4-gud8
9
url VCID-xa12-b129-gkb9
vulnerability_id VCID-xa12-b129-gkb9
summary gcc: Write access violation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4490.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4490
reference_id
reference_type
scores
0
value 0.0061
scoring_system epss
scoring_elements 0.69706
published_at 2026-04-01T12:55:00Z
1
value 0.0061
scoring_system epss
scoring_elements 0.69718
published_at 2026-04-02T12:55:00Z
2
value 0.0061
scoring_system epss
scoring_elements 0.69734
published_at 2026-04-04T12:55:00Z
3
value 0.0061
scoring_system epss
scoring_elements 0.69711
published_at 2026-04-07T12:55:00Z
4
value 0.0061
scoring_system epss
scoring_elements 0.6976
published_at 2026-04-08T12:55:00Z
5
value 0.0061
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-09T12:55:00Z
6
value 0.0061
scoring_system epss
scoring_elements 0.69798
published_at 2026-04-11T12:55:00Z
7
value 0.0061
scoring_system epss
scoring_elements 0.69783
published_at 2026-04-12T12:55:00Z
8
value 0.0061
scoring_system epss
scoring_elements 0.69768
published_at 2026-04-13T12:55:00Z
9
value 0.0061
scoring_system epss
scoring_elements 0.69809
published_at 2026-04-16T12:55:00Z
10
value 0.0061
scoring_system epss
scoring_elements 0.69819
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333366
reference_id 1333366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333366
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4490
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa12-b129-gkb9
Fixing_vulnerabilities
Risk_score6.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@0.5.0-1