Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ht@2.0.14-1
Typedeb
Namespacedebian
Nameht
Version2.0.14-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.1.0+repack1-2
Latest_non_vulnerable_version2.1.0+repack1-2
Affected_by_vulnerabilities
0
url VCID-1bz7-thv9-cyc6
vulnerability_id VCID-1bz7-thv9-cyc6
summary gcc: Invalid write due to a use-after-free to array ktypevec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4488.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4488.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4488
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62773
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62831
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62861
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62892
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62899
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62877
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62918
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333332
reference_id 1333332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333332
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4488
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bz7-thv9-cyc6
1
url VCID-aamn-9dtp-6fg6
vulnerability_id VCID-aamn-9dtp-6fg6
summary gcc: Read access violations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4493.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4493
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63166
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63225
published_at 2026-04-02T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63255
published_at 2026-04-04T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.6322
published_at 2026-04-07T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63272
published_at 2026-04-08T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63289
published_at 2026-04-09T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-11T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.6329
published_at 2026-04-12T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63254
published_at 2026-04-13T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63291
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333383
reference_id 1333383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333383
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4493
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aamn-9dtp-6fg6
2
url VCID-cd45-a3xv-6uhw
vulnerability_id VCID-cd45-a3xv-6uhw
summary gcc: Read access violations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4492.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4492
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.44976
published_at 2026-04-01T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45057
published_at 2026-04-02T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45079
published_at 2026-04-04T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45021
published_at 2026-04-07T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45073
published_at 2026-04-09T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45095
published_at 2026-04-11T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45063
published_at 2026-04-12T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45065
published_at 2026-04-13T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45113
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333377
reference_id 1333377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333377
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4492
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd45-a3xv-6uhw
3
url VCID-juv3-bucu-efhy
vulnerability_id VCID-juv3-bucu-efhy
summary gcc: Exploitable buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2226.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2226
reference_id
reference_type
scores
0
value 0.09327
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-01T12:55:00Z
1
value 0.09327
scoring_system epss
scoring_elements 0.92736
published_at 2026-04-02T12:55:00Z
2
value 0.09327
scoring_system epss
scoring_elements 0.92742
published_at 2026-04-04T12:55:00Z
3
value 0.09327
scoring_system epss
scoring_elements 0.9274
published_at 2026-04-07T12:55:00Z
4
value 0.09327
scoring_system epss
scoring_elements 0.92749
published_at 2026-04-08T12:55:00Z
5
value 0.09327
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-09T12:55:00Z
6
value 0.09327
scoring_system epss
scoring_elements 0.92759
published_at 2026-04-11T12:55:00Z
7
value 0.09327
scoring_system epss
scoring_elements 0.92758
published_at 2026-04-13T12:55:00Z
8
value 0.09327
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2226
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333322
reference_id 1333322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333322
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
reference_id CVE-2016-2226
reference_type exploit
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42386.txt
reference_id CVE-2016-2226
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42386.txt
9
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
10
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
11
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
12
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-2226
risk_score 6.8
exploitability 2.0
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juv3-bucu-efhy
4
url VCID-nxer-a1h8-gfek
vulnerability_id VCID-nxer-a1h8-gfek
summary gcc: Invalid write due to integer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4489.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4489
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62773
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62831
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62861
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62892
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62899
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62877
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62918
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333336
reference_id 1333336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333336
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4489
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxer-a1h8-gfek
5
url VCID-sgrx-ndrs-nqdg
vulnerability_id VCID-sgrx-ndrs-nqdg
summary gcc: Invalid write due to a use-after-free to array btypevec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4487.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4487
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30969
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31094
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31141
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31015
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31044
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31051
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31007
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30962
published_at 2026-04-13T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30993
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333330
reference_id 1333330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333330
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4487
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgrx-ndrs-nqdg
6
url VCID-w77d-kbu4-gud8
vulnerability_id VCID-w77d-kbu4-gud8
summary gcc,gdb,binutils,libitm: Stack overflow vulnerability in libiberty demangler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6131.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6131
reference_id
reference_type
scores
0
value 0.0176
scoring_system epss
scoring_elements 0.82537
published_at 2026-04-01T12:55:00Z
1
value 0.0176
scoring_system epss
scoring_elements 0.82638
published_at 2026-04-16T12:55:00Z
2
value 0.0176
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-12T12:55:00Z
3
value 0.0176
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-13T12:55:00Z
4
value 0.0176
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-02T12:55:00Z
5
value 0.0176
scoring_system epss
scoring_elements 0.82566
published_at 2026-04-04T12:55:00Z
6
value 0.0176
scoring_system epss
scoring_elements 0.82562
published_at 2026-04-07T12:55:00Z
7
value 0.0176
scoring_system epss
scoring_elements 0.82588
published_at 2026-04-08T12:55:00Z
8
value 0.0176
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-09T12:55:00Z
9
value 0.0176
scoring_system epss
scoring_elements 0.82614
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1352068
reference_id 1352068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1352068
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840889
reference_id 840889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840889
6
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
7
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
8
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-6131
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w77d-kbu4-gud8
7
url VCID-xa12-b129-gkb9
vulnerability_id VCID-xa12-b129-gkb9
summary gcc: Write access violation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4490.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4490
reference_id
reference_type
scores
0
value 0.0061
scoring_system epss
scoring_elements 0.69706
published_at 2026-04-01T12:55:00Z
1
value 0.0061
scoring_system epss
scoring_elements 0.69718
published_at 2026-04-02T12:55:00Z
2
value 0.0061
scoring_system epss
scoring_elements 0.69734
published_at 2026-04-04T12:55:00Z
3
value 0.0061
scoring_system epss
scoring_elements 0.69711
published_at 2026-04-07T12:55:00Z
4
value 0.0061
scoring_system epss
scoring_elements 0.6976
published_at 2026-04-08T12:55:00Z
5
value 0.0061
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-09T12:55:00Z
6
value 0.0061
scoring_system epss
scoring_elements 0.69798
published_at 2026-04-11T12:55:00Z
7
value 0.0061
scoring_system epss
scoring_elements 0.69783
published_at 2026-04-12T12:55:00Z
8
value 0.0061
scoring_system epss
scoring_elements 0.69768
published_at 2026-04-13T12:55:00Z
9
value 0.0061
scoring_system epss
scoring_elements 0.69809
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333366
reference_id 1333366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333366
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/ht@2.1.0%2Brepack1-2
purl pkg:deb/debian/ht@2.1.0%2Brepack1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.1.0%252Brepack1-2
aliases CVE-2016-4490
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa12-b129-gkb9
Fixing_vulnerabilities
Risk_score6.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ht@2.0.14-1