Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/libraw@0.20.0-r0?arch=armhf&distroversion=v3.21&reponame=community |
| Type | apk |
| Namespace | alpine |
| Name | libraw |
| Version | 0.20.0-r0 |
| Qualifiers |
| arch |
armhf |
| distroversion |
v3.21 |
| reponame |
community |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 0.21.1-r2 |
| Latest_non_vulnerable_version | 0.21.1-r2 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-25js-gs2n-jbfb |
| vulnerability_id |
VCID-25js-gs2n-jbfb |
| summary |
LibRaw: Out-of-bounds read in LibRaw::adobe_copy_pixel() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35533 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08119 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08178 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08265 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08257 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08237 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0822 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.081 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08261 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35533 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35533
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-25js-gs2n-jbfb |
|
| 1 |
| url |
VCID-43af-u5hy-afcg |
| vulnerability_id |
VCID-43af-u5hy-afcg |
| summary |
LibRaw: Out-of-bounds read in simple_decode_row() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35532 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08119 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08178 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08265 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08257 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08237 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0822 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.081 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08261 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35532 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35532
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-43af-u5hy-afcg |
|
| 2 |
| url |
VCID-54h1-vj6r-4ue5 |
| vulnerability_id |
VCID-54h1-vj6r-4ue5 |
| summary |
LibRaw: Out-of-bounds read in LibRaw::parseSonySRF() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35535 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14726 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.148 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14606 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14695 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14754 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14714 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14622 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14513 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14519 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14585 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35535 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35535
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54h1-vj6r-4ue5 |
|
| 3 |
| url |
VCID-ajfp-293b-q7ap |
| vulnerability_id |
VCID-ajfp-293b-q7ap |
| summary |
Multiple vulnerabilities have been found in LibRaw, the worst of
which may allow attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24890 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63503 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63563 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63591 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63554 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63606 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63623 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63638 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63622 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63589 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63634 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00449 |
| scoring_system |
epss |
| scoring_elements |
0.63618 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24890 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-24890
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ajfp-293b-q7ap |
|
| 4 |
| url |
VCID-cx7p-nhr2-v3ay |
| vulnerability_id |
VCID-cx7p-nhr2-v3ay |
| summary |
LibRaw: Memory corruption in "crxFreeSubbandData()" function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35534 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36141 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.3637 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36205 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36273 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36278 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.3626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36244 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36192 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35534 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35534
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cx7p-nhr2-v3ay |
|
| 5 |
| url |
VCID-e8z6-tmrt-8yb9 |
| vulnerability_id |
VCID-e8z6-tmrt-8yb9 |
| summary |
Nagios XI 5.7.2 is affected by a remote code execution (RCE) vulnerability. An authenticated user can inject additional commands into normal webapp query. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24899 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89036 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89045 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.8906 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89062 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89079 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89084 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89096 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89092 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.8909 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.89104 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.04468 |
| scoring_system |
epss |
| scoring_elements |
0.891 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-24899 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-24899
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e8z6-tmrt-8yb9 |
|
| 6 |
| url |
VCID-n9u1-b4b8-sqft |
| vulnerability_id |
VCID-n9u1-b4b8-sqft |
| summary |
LibRaw: Out of bounds write in new_node() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08119 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08178 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08265 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08257 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08237 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0822 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.081 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08261 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35530 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35530
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n9u1-b4b8-sqft |
|
| 7 |
| url |
VCID-npjj-h25x-c7ge |
| vulnerability_id |
VCID-npjj-h25x-c7ge |
| summary |
LibRaw: Out-of-bounds read in get_huffman_diff() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35531 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08119 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08178 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08265 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08257 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08237 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0822 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.081 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08261 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35531 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35531
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-npjj-h25x-c7ge |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libraw@0.20.0-r0%3Farch=armhf&distroversion=v3.21&reponame=community |