Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/glibc@2.17-222?arch=el7
Typerpm
Namespaceredhat
Nameglibc
Version2.17-222
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-aapy-xr76-zbc4
vulnerability_id VCID-aapy-xr76-zbc4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9402
reference_id
reference_type
scores
0
value 0.087
scoring_system epss
scoring_elements 0.92444
published_at 2026-04-01T12:55:00Z
1
value 0.087
scoring_system epss
scoring_elements 0.92451
published_at 2026-04-02T12:55:00Z
2
value 0.087
scoring_system epss
scoring_elements 0.92459
published_at 2026-04-04T12:55:00Z
3
value 0.087
scoring_system epss
scoring_elements 0.92462
published_at 2026-04-07T12:55:00Z
4
value 0.087
scoring_system epss
scoring_elements 0.92474
published_at 2026-04-08T12:55:00Z
5
value 0.087
scoring_system epss
scoring_elements 0.92479
published_at 2026-04-09T12:55:00Z
6
value 0.087
scoring_system epss
scoring_elements 0.92485
published_at 2026-04-11T12:55:00Z
7
value 0.087
scoring_system epss
scoring_elements 0.92487
published_at 2026-04-12T12:55:00Z
8
value 0.087
scoring_system epss
scoring_elements 0.92486
published_at 2026-04-13T12:55:00Z
9
value 0.087
scoring_system epss
scoring_elements 0.92496
published_at 2026-04-18T12:55:00Z
10
value 0.087
scoring_system epss
scoring_elements 0.92499
published_at 2026-04-21T12:55:00Z
11
value 0.087
scoring_system epss
scoring_elements 0.92501
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1175369
reference_id 1175369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1175369
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572
reference_id 775572
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572
10
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
11
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
12
reference_url https://usn.ubuntu.com/2519-1/
reference_id USN-2519-1
reference_type
scores
url https://usn.ubuntu.com/2519-1/
fixed_packages
aliases CVE-2014-9402
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aapy-xr76-zbc4
1
url VCID-hdz6-ewkg-xqc9
vulnerability_id VCID-hdz6-ewkg-xqc9
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15804
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43014
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.42996
published_at 2026-04-24T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43077
published_at 2026-04-13T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43137
published_at 2026-04-16T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43127
published_at 2026-04-18T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43061
published_at 2026-04-21T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43072
published_at 2026-04-02T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.431
published_at 2026-04-04T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43039
published_at 2026-04-07T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43092
published_at 2026-04-12T12:55:00Z
10
value 0.00207
scoring_system epss
scoring_elements 0.43104
published_at 2026-04-09T12:55:00Z
11
value 0.00207
scoring_system epss
scoring_elements 0.43126
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15804
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22332
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22332
5
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
6
reference_url http://www.securityfocus.com/bid/101535
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101535
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1505298
reference_id 1505298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1505298
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955
reference_id 879955
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15804
reference_id CVE-2017-15804
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15804
11
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
12
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
13
reference_url https://access.redhat.com/errata/RHSA-2018:1879
reference_id RHSA-2018:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1879
14
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
aliases CVE-2017-15804
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz6-ewkg-xqc9
2
url VCID-q5az-xe7k-m7av
vulnerability_id VCID-q5az-xe7k-m7av
summary glibc: Fragmentation attacks possible when EDNS0 is enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12132
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52657
published_at 2026-04-01T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52735
published_at 2026-04-24T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52803
published_at 2026-04-18T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52786
published_at 2026-04-21T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52702
published_at 2026-04-02T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52729
published_at 2026-04-04T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52694
published_at 2026-04-07T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52745
published_at 2026-04-08T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.5274
published_at 2026-04-09T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.5279
published_at 2026-04-11T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52774
published_at 2026-04-12T12:55:00Z
11
value 0.00294
scoring_system epss
scoring_elements 0.52758
published_at 2026-04-13T12:55:00Z
12
value 0.00294
scoring_system epss
scoring_elements 0.52795
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12132
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477529
reference_id 1477529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477529
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650
reference_id 870650
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650
5
reference_url https://security.archlinux.org/AVG-368
reference_id AVG-368
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-368
6
reference_url https://security.archlinux.org/AVG-369
reference_id AVG-369
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-369
7
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
8
reference_url https://usn.ubuntu.com/5768-1/
reference_id USN-5768-1
reference_type
scores
url https://usn.ubuntu.com/5768-1/
fixed_packages
aliases CVE-2017-12132
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5az-xe7k-m7av
3
url VCID-vake-u1n1-x3hx
vulnerability_id VCID-vake-u1n1-x3hx
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5180
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.6116
published_at 2026-04-01T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61236
published_at 2026-04-07T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61284
published_at 2026-04-08T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61299
published_at 2026-04-09T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61318
published_at 2026-04-11T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61304
published_at 2026-04-12T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61285
published_at 2026-04-13T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.6124
published_at 2026-04-02T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61269
published_at 2026-04-04T12:55:00Z
9
value 0.00737
scoring_system epss
scoring_elements 0.72876
published_at 2026-04-16T12:55:00Z
10
value 0.00737
scoring_system epss
scoring_elements 0.72885
published_at 2026-04-18T12:55:00Z
11
value 0.00737
scoring_system epss
scoring_elements 0.72878
published_at 2026-04-21T12:55:00Z
12
value 0.00737
scoring_system epss
scoring_elements 0.7292
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1249603
reference_id 1249603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1249603
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106
reference_id 796106
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106
6
reference_url https://security.gentoo.org/glsa/201706-19
reference_id GLSA-201706-19
reference_type
scores
url https://security.gentoo.org/glsa/201706-19
7
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
8
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
aliases CVE-2015-5180
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vake-u1n1-x3hx
4
url VCID-wctr-ebf2-gqa1
vulnerability_id VCID-wctr-ebf2-gqa1
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15670
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44273
published_at 2026-04-01T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44233
published_at 2026-04-24T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44376
published_at 2026-04-11T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44345
published_at 2026-04-12T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.444
published_at 2026-04-16T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.4439
published_at 2026-04-18T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4432
published_at 2026-04-21T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44344
published_at 2026-04-13T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44366
published_at 2026-04-04T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44302
published_at 2026-04-07T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44354
published_at 2026-04-08T12:55:00Z
11
value 0.00218
scoring_system epss
scoring_elements 0.44359
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22320
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22320
5
reference_url http://www.securityfocus.com/bid/101521
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101521
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1504804
reference_id 1504804
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1504804
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501
reference_id 879501
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501
8
reference_url https://security.archlinux.org/ASA-201801-8
reference_id ASA-201801-8
reference_type
scores
url https://security.archlinux.org/ASA-201801-8
9
reference_url https://security.archlinux.org/ASA-201801-9
reference_id ASA-201801-9
reference_type
scores
url https://security.archlinux.org/ASA-201801-9
10
reference_url https://security.archlinux.org/AVG-460
reference_id AVG-460
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-460
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15670
reference_id CVE-2017-15670
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15670
13
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
14
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
15
reference_url https://access.redhat.com/errata/RHSA-2018:1879
reference_id RHSA-2018:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1879
16
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
aliases CVE-2017-15670
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wctr-ebf2-gqa1
5
url VCID-ww2m-6691-yfa7
vulnerability_id VCID-ww2m-6691-yfa7
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000001
reference_id
reference_type
scores
0
value 0.41417
scoring_system epss
scoring_elements 0.97411
published_at 2026-04-21T12:55:00Z
1
value 0.41417
scoring_system epss
scoring_elements 0.974
published_at 2026-04-12T12:55:00Z
2
value 0.41417
scoring_system epss
scoring_elements 0.97401
published_at 2026-04-13T12:55:00Z
3
value 0.41417
scoring_system epss
scoring_elements 0.97409
published_at 2026-04-16T12:55:00Z
4
value 0.41417
scoring_system epss
scoring_elements 0.97412
published_at 2026-04-24T12:55:00Z
5
value 0.41417
scoring_system epss
scoring_elements 0.9739
published_at 2026-04-07T12:55:00Z
6
value 0.41417
scoring_system epss
scoring_elements 0.97396
published_at 2026-04-08T12:55:00Z
7
value 0.41417
scoring_system epss
scoring_elements 0.97397
published_at 2026-04-09T12:55:00Z
8
value 0.41417
scoring_system epss
scoring_elements 0.97399
published_at 2026-04-11T12:55:00Z
9
value 0.44049
scoring_system epss
scoring_elements 0.97524
published_at 2026-04-02T12:55:00Z
10
value 0.44049
scoring_system epss
scoring_elements 0.97527
published_at 2026-04-04T12:55:00Z
11
value 0.44049
scoring_system epss
scoring_elements 0.97518
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1533836
reference_id 1533836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1533836
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001
reference_id 887001
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001
5
reference_url https://security.archlinux.org/ASA-201801-18
reference_id ASA-201801-18
reference_type
scores
url https://security.archlinux.org/ASA-201801-18
6
reference_url https://security.archlinux.org/ASA-201801-19
reference_id ASA-201801-19
reference_type
scores
url https://security.archlinux.org/ASA-201801-19
7
reference_url https://security.archlinux.org/AVG-590
reference_id AVG-590
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-590
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb
10
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb
11
reference_url https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
12
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
13
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
14
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
15
reference_url https://usn.ubuntu.com/3536-1/
reference_id USN-3536-1
reference_type
scores
url https://usn.ubuntu.com/3536-1/
16
reference_url https://usn.ubuntu.com/USN-4768-1/
reference_id USN-USN-4768-1
reference_type
scores
url https://usn.ubuntu.com/USN-4768-1/
fixed_packages
aliases CVE-2018-1000001
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ww2m-6691-yfa7
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glibc@2.17-222%3Farch=el7