Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/klibc@1.4.34-1
Typedeb
Namespacedebian
Nameklibc
Version1.4.34-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.0.8-6.1
Latest_non_vulnerable_version2.0.8-6.1
Affected_by_vulnerabilities
0
url VCID-36y6-h6vw-xkc1
vulnerability_id VCID-36y6-h6vw-xkc1
summary An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31871
reference_id
reference_type
scores
0
value 0.01589
scoring_system epss
scoring_elements 0.81564
published_at 2026-04-01T12:55:00Z
1
value 0.01589
scoring_system epss
scoring_elements 0.81576
published_at 2026-04-02T12:55:00Z
2
value 0.01589
scoring_system epss
scoring_elements 0.81597
published_at 2026-04-04T12:55:00Z
3
value 0.01589
scoring_system epss
scoring_elements 0.81595
published_at 2026-04-07T12:55:00Z
4
value 0.01589
scoring_system epss
scoring_elements 0.81623
published_at 2026-04-08T12:55:00Z
5
value 0.01589
scoring_system epss
scoring_elements 0.81628
published_at 2026-04-13T12:55:00Z
6
value 0.01589
scoring_system epss
scoring_elements 0.81648
published_at 2026-04-11T12:55:00Z
7
value 0.01589
scoring_system epss
scoring_elements 0.81635
published_at 2026-04-12T12:55:00Z
8
value 0.01589
scoring_system epss
scoring_elements 0.81666
published_at 2026-04-16T12:55:00Z
9
value 0.01589
scoring_system epss
scoring_elements 0.81665
published_at 2026-04-18T12:55:00Z
10
value 0.01589
scoring_system epss
scoring_elements 0.81669
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31871
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31871
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6.1
purl pkg:deb/debian/klibc@2.0.8-6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1
aliases CVE-2021-31871
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36y6-h6vw-xkc1
1
url VCID-c25w-wgnm-yyfj
vulnerability_id VCID-c25w-wgnm-yyfj
summary
A vulnerability in klibc could allow remote attackers to execute
    arbitrary shell code.
references
0
reference_url https://access.redhat.com/security/cve/cve-2011-1930
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2011-1930
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1930
reference_id
reference_type
scores
0
value 0.28991
scoring_system epss
scoring_elements 0.96585
published_at 2026-04-21T12:55:00Z
1
value 0.28991
scoring_system epss
scoring_elements 0.96582
published_at 2026-04-18T12:55:00Z
2
value 0.28991
scoring_system epss
scoring_elements 0.96538
published_at 2026-04-01T12:55:00Z
3
value 0.28991
scoring_system epss
scoring_elements 0.96546
published_at 2026-04-02T12:55:00Z
4
value 0.28991
scoring_system epss
scoring_elements 0.96552
published_at 2026-04-04T12:55:00Z
5
value 0.28991
scoring_system epss
scoring_elements 0.96554
published_at 2026-04-07T12:55:00Z
6
value 0.28991
scoring_system epss
scoring_elements 0.96562
published_at 2026-04-08T12:55:00Z
7
value 0.28991
scoring_system epss
scoring_elements 0.96564
published_at 2026-04-09T12:55:00Z
8
value 0.28991
scoring_system epss
scoring_elements 0.96567
published_at 2026-04-12T12:55:00Z
9
value 0.28991
scoring_system epss
scoring_elements 0.9657
published_at 2026-04-13T12:55:00Z
10
value 0.28991
scoring_system epss
scoring_elements 0.96576
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1930
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1930
3
reference_url http://security.gentoo.org/glsa/glsa-201309-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-21.xml
4
reference_url https://security-tracker.debian.org/tracker/CVE-2011-1930
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2011-1930
5
reference_url http://www.openwall.com/lists/oss-security/2012/05/22/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/05/22/12
6
reference_url http://www.securityfocus.com/bid/47924
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47924
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1930
reference_id CVE-2011-1930
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2011-1930
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35785.txt
reference_id CVE-2011-1930;OSVDB-73394
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35785.txt
13
reference_url https://www.securityfocus.com/bid/47924/info
reference_id CVE-2011-1930;OSVDB-73394
reference_type exploit
scores
url https://www.securityfocus.com/bid/47924/info
14
reference_url https://security.gentoo.org/glsa/201309-21
reference_id GLSA-201309-21
reference_type
scores
url https://security.gentoo.org/glsa/201309-21
fixed_packages
0
url pkg:deb/debian/klibc@2.0.1-3.1
purl pkg:deb/debian/klibc@2.0.1-3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-36y6-h6vw-xkc1
1
vulnerability VCID-exyu-7j28-43ga
2
vulnerability VCID-s96y-8z6t-3yff
3
vulnerability VCID-z6ae-emwm-wkb3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.1-3.1
aliases CVE-2011-1930
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c25w-wgnm-yyfj
2
url VCID-exyu-7j28-43ga
vulnerability_id VCID-exyu-7j28-43ga
summary An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31873
reference_id
reference_type
scores
0
value 0.00889
scoring_system epss
scoring_elements 0.75452
published_at 2026-04-01T12:55:00Z
1
value 0.00889
scoring_system epss
scoring_elements 0.75455
published_at 2026-04-02T12:55:00Z
2
value 0.00889
scoring_system epss
scoring_elements 0.75486
published_at 2026-04-04T12:55:00Z
3
value 0.00889
scoring_system epss
scoring_elements 0.75466
published_at 2026-04-07T12:55:00Z
4
value 0.00889
scoring_system epss
scoring_elements 0.75508
published_at 2026-04-08T12:55:00Z
5
value 0.00889
scoring_system epss
scoring_elements 0.75518
published_at 2026-04-09T12:55:00Z
6
value 0.00889
scoring_system epss
scoring_elements 0.75537
published_at 2026-04-11T12:55:00Z
7
value 0.00889
scoring_system epss
scoring_elements 0.75516
published_at 2026-04-12T12:55:00Z
8
value 0.00889
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-13T12:55:00Z
9
value 0.00889
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-16T12:55:00Z
10
value 0.00889
scoring_system epss
scoring_elements 0.75554
published_at 2026-04-18T12:55:00Z
11
value 0.00889
scoring_system epss
scoring_elements 0.75541
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31873
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31873
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6.1
purl pkg:deb/debian/klibc@2.0.8-6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1
aliases CVE-2021-31873
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exyu-7j28-43ga
3
url VCID-s96y-8z6t-3yff
vulnerability_id VCID-s96y-8z6t-3yff
summary An issue was discovered in klibc before 2.0.9. Multiple possible integer overflows in the cpio command on 32-bit systems may result in a buffer overflow or other security impact.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31872
reference_id
reference_type
scores
0
value 0.01173
scoring_system epss
scoring_elements 0.78639
published_at 2026-04-01T12:55:00Z
1
value 0.01173
scoring_system epss
scoring_elements 0.78645
published_at 2026-04-02T12:55:00Z
2
value 0.01173
scoring_system epss
scoring_elements 0.78675
published_at 2026-04-04T12:55:00Z
3
value 0.01173
scoring_system epss
scoring_elements 0.78656
published_at 2026-04-07T12:55:00Z
4
value 0.01173
scoring_system epss
scoring_elements 0.78682
published_at 2026-04-08T12:55:00Z
5
value 0.01173
scoring_system epss
scoring_elements 0.78688
published_at 2026-04-09T12:55:00Z
6
value 0.01173
scoring_system epss
scoring_elements 0.78713
published_at 2026-04-18T12:55:00Z
7
value 0.01173
scoring_system epss
scoring_elements 0.78695
published_at 2026-04-12T12:55:00Z
8
value 0.01173
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-13T12:55:00Z
9
value 0.01173
scoring_system epss
scoring_elements 0.78716
published_at 2026-04-16T12:55:00Z
10
value 0.01173
scoring_system epss
scoring_elements 0.7871
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31872
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31872
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6.1
purl pkg:deb/debian/klibc@2.0.8-6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1
aliases CVE-2021-31872
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s96y-8z6t-3yff
4
url VCID-z6ae-emwm-wkb3
vulnerability_id VCID-z6ae-emwm-wkb3
summary An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31870
reference_id
reference_type
scores
0
value 0.01279
scoring_system epss
scoring_elements 0.79518
published_at 2026-04-01T12:55:00Z
1
value 0.01279
scoring_system epss
scoring_elements 0.79524
published_at 2026-04-02T12:55:00Z
2
value 0.01279
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-04T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79534
published_at 2026-04-07T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-08T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-09T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.79592
published_at 2026-04-11T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79575
published_at 2026-04-12T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.79567
published_at 2026-04-13T12:55:00Z
9
value 0.01279
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-16T12:55:00Z
10
value 0.01279
scoring_system epss
scoring_elements 0.79596
published_at 2026-04-18T12:55:00Z
11
value 0.01279
scoring_system epss
scoring_elements 0.79599
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31870
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31870
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6.1
purl pkg:deb/debian/klibc@2.0.8-6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1
aliases CVE-2021-31870
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6ae-emwm-wkb3
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@1.4.34-1