Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/busybox@1:1.35.0-4
Typedeb
Namespacedebian
Namebusybox
Version1:1.35.0-4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:1.35.0-4+deb12u1
Latest_non_vulnerable_version1:1.37.0-10.1
Affected_by_vulnerabilities
0
url VCID-8844-hdkd-yyc7
vulnerability_id VCID-8844-hdkd-yyc7
summary busybox: BusyBox: Arbitrary file modification and privilege escalation via unvalidated tar archive entries
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26158.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-26158
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00232
published_at 2026-04-13T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.0024
published_at 2026-04-02T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.00238
published_at 2026-04-07T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00236
published_at 2026-04-08T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00235
published_at 2026-04-09T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00234
published_at 2026-04-11T12:55:00Z
6
value 5e-05
scoring_system epss
scoring_elements 0.00233
published_at 2026-04-12T12:55:00Z
7
value 5e-05
scoring_system epss
scoring_elements 0.00241
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-26158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26158
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127782
reference_id 1127782
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127782
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439040
reference_id 2439040
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-12T04:55:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2439040
6
reference_url https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb
reference_id archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-12T04:55:24Z/
url https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://access.redhat.com/security/cve/CVE-2026-26158
reference_id CVE-2026-26158
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-12T04:55:24Z/
url https://access.redhat.com/security/cve/CVE-2026-26158
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
1
url pkg:deb/debian/busybox@1:1.37.0-10.1
purl pkg:deb/debian/busybox@1:1.37.0-10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.37.0-10.1
aliases CVE-2026-26158
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8844-hdkd-yyc7
1
url VCID-9s28-b1gj-uqaj
vulnerability_id VCID-9s28-b1gj-uqaj
summary busybox: stack overflow vulnerability in ash.c leads to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48174.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48174
reference_id
reference_type
scores
0
value 0.00679
scoring_system epss
scoring_elements 0.71523
published_at 2026-04-02T12:55:00Z
1
value 0.00679
scoring_system epss
scoring_elements 0.71554
published_at 2026-04-13T12:55:00Z
2
value 0.00679
scoring_system epss
scoring_elements 0.71588
published_at 2026-04-11T12:55:00Z
3
value 0.00679
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-12T12:55:00Z
4
value 0.00679
scoring_system epss
scoring_elements 0.7154
published_at 2026-04-04T12:55:00Z
5
value 0.00679
scoring_system epss
scoring_elements 0.71513
published_at 2026-04-07T12:55:00Z
6
value 0.00679
scoring_system epss
scoring_elements 0.71553
published_at 2026-04-08T12:55:00Z
7
value 0.00679
scoring_system epss
scoring_elements 0.71565
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48174
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059049
reference_id 1059049
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059049
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237153
reference_id 2237153
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237153
6
reference_url https://access.redhat.com/errata/RHSA-2023:5178
reference_id RHSA-2023:5178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5178
7
reference_url https://bugs.busybox.net/show_bug.cgi?id=15216
reference_id show_bug.cgi?id=15216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-03T14:24:43Z/
url https://bugs.busybox.net/show_bug.cgi?id=15216
8
reference_url https://usn.ubuntu.com/6335-1/
reference_id USN-6335-1
reference_type
scores
url https://usn.ubuntu.com/6335-1/
9
reference_url https://usn.ubuntu.com/6961-1/
reference_id USN-6961-1
reference_type
scores
url https://usn.ubuntu.com/6961-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2022-48174
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9s28-b1gj-uqaj
2
url VCID-fugr-ve7z-efdb
vulnerability_id VCID-fugr-ve7z-efdb
summary busybox: BusyBox: Arbitrary file overwrite and potential code execution via incomplete path sanitization
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26157.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26157.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-26157
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00278
published_at 2026-04-13T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00296
published_at 2026-04-02T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00293
published_at 2026-04-04T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00285
published_at 2026-04-07T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00283
published_at 2026-04-08T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00282
published_at 2026-04-11T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00279
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-26157
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26157
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127782
reference_id 1127782
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127782
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439039
reference_id 2439039
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-12T04:55:24Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-11T20:50:59Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2439039
6
reference_url https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb
reference_id archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-12T04:55:24Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-11T20:50:59Z/
url https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://access.redhat.com/security/cve/CVE-2026-26157
reference_id CVE-2026-26157
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-12T04:55:24Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-11T20:50:59Z/
url https://access.redhat.com/security/cve/CVE-2026-26157
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
1
url pkg:deb/debian/busybox@1:1.37.0-10.1
purl pkg:deb/debian/busybox@1:1.37.0-10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.37.0-10.1
aliases CVE-2026-26157
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fugr-ve7z-efdb
3
url VCID-g5t1-3tab-uuf9
vulnerability_id VCID-g5t1-3tab-uuf9
summary In netstat in BusyBox through 1.37.0, local users can launch of network application with an argv[0] containing an ANSI terminal escape sequence, leading to a denial of service (terminal locked up) when netstat is used by a victim.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-58251
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.23085
published_at 2026-04-13T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23201
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23245
published_at 2026-04-04T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23035
published_at 2026-04-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23108
published_at 2026-04-08T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23161
published_at 2026-04-09T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23181
published_at 2026-04-11T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23143
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-58251
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58251
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104009
reference_id 1104009
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104009
4
reference_url https://www.busybox.net/downloads/
reference_id downloads
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T18:35:32Z/
url https://www.busybox.net/downloads/
5
reference_url https://bugs.busybox.net/show_bug.cgi?id=15922
reference_id show_bug.cgi?id=15922
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T18:35:32Z/
url https://bugs.busybox.net/show_bug.cgi?id=15922
6
reference_url https://www.busybox.net
reference_id www.busybox.net
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T18:35:32Z/
url https://www.busybox.net
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
1
url pkg:deb/debian/busybox@1:1.37.0-10.1
purl pkg:deb/debian/busybox@1:1.37.0-10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.37.0-10.1
aliases CVE-2024-58251
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5t1-3tab-uuf9
4
url VCID-jjqh-pw7r-buau
vulnerability_id VCID-jjqh-pw7r-buau
summary In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-46394
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24224
published_at 2026-04-07T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24333
published_at 2026-04-09T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24442
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.2429
published_at 2026-04-08T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24409
published_at 2026-04-02T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24251
published_at 2026-04-13T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24308
published_at 2026-04-12T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24351
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-46394
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46394
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104008
reference_id 1104008
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104008
4
reference_url https://security.archlinux.org/AVG-2880
reference_id AVG-2880
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2880
5
reference_url https://www.busybox.net/downloads/
reference_id downloads
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:43:05Z/
url https://www.busybox.net/downloads/
6
reference_url https://bugs.busybox.net/show_bug.cgi?id=16018
reference_id show_bug.cgi?id=16018
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:43:05Z/
url https://bugs.busybox.net/show_bug.cgi?id=16018
7
reference_url https://www.busybox.net
reference_id www.busybox.net
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:43:05Z/
url https://www.busybox.net
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
1
url pkg:deb/debian/busybox@1:1.37.0-10.1
purl pkg:deb/debian/busybox@1:1.37.0-10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.37.0-10.1
aliases CVE-2025-46394
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jjqh-pw7r-buau
5
url VCID-n1u3-njfx-vfcp
vulnerability_id VCID-n1u3-njfx-vfcp
summary busybox: A heap-buffer-overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42366.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42366
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06631
published_at 2026-04-04T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06596
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08131
published_at 2026-04-09T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-11T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08103
published_at 2026-04-12T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08085
published_at 2026-04-13T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08049
published_at 2026-04-07T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08109
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42366
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059053
reference_id 1059053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059053
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2251851
reference_id 2251851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2251851
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
1
url pkg:deb/debian/busybox@1:1.37.0-10.1
purl pkg:deb/debian/busybox@1:1.37.0-10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.37.0-10.1
aliases CVE-2023-42366
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1u3-njfx-vfcp
6
url VCID-syfd-zx16-n3gy
vulnerability_id VCID-syfd-zx16-n3gy
summary busybox: A use-after-free in Busybox's awk applet leads to denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30065.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30065
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66195
published_at 2026-04-02T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66221
published_at 2026-04-04T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.66191
published_at 2026-04-07T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.66239
published_at 2026-04-08T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66252
published_at 2026-04-09T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.66272
published_at 2026-04-11T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.66259
published_at 2026-04-12T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66228
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30065
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30065
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2088233
reference_id 2088233
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2088233
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2022-30065
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syfd-zx16-n3gy
7
url VCID-t62w-rrsb-vqgy
vulnerability_id VCID-t62w-rrsb-vqgy
summary busybox: BusyBox wget: HTTP request-target allows header injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-60876.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-60876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-60876
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13208
published_at 2026-04-13T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13327
published_at 2026-04-09T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13295
published_at 2026-04-11T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13257
published_at 2026-04-12T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.138
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20059
published_at 2026-04-02T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20117
published_at 2026-04-04T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19844
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-60876
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-60876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-60876
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120795
reference_id 1120795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120795
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2413825
reference_id 2413825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2413825
6
reference_url https://gist.github.com/subyumatest/41554af6a72aedaacaec026adc311092
reference_id 41554af6a72aedaacaec026adc311092
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:45:24Z/
url https://gist.github.com/subyumatest/41554af6a72aedaacaec026adc311092
7
reference_url https://lists.busybox.net/pipermail/busybox/attachments/20250823/ccdc96ef/attachment-0001.htm
reference_id attachment-0001.htm
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:45:24Z/
url https://lists.busybox.net/pipermail/busybox/attachments/20250823/ccdc96ef/attachment-0001.htm
8
reference_url https://lists.busybox.net/pipermail/busybox/attachments/20250828/e7f90492/attachment.htm
reference_id attachment.htm
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:45:24Z/
url https://lists.busybox.net/pipermail/busybox/attachments/20250828/e7f90492/attachment.htm
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
1
url pkg:deb/debian/busybox@1:1.37.0-10.1
purl pkg:deb/debian/busybox@1:1.37.0-10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.37.0-10.1
aliases CVE-2025-60876
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t62w-rrsb-vqgy
8
url VCID-v6td-yjyg-rub4
vulnerability_id VCID-v6td-yjyg-rub4
summary busybox: use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42365.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42365
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09224
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09269
published_at 2026-04-11T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09238
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09225
published_at 2026-04-04T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09148
published_at 2026-04-07T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09229
published_at 2026-04-08T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09267
published_at 2026-04-09T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09473
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42365
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059052
reference_id 1059052
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059052
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2251853
reference_id 2251853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2251853
6
reference_url https://usn.ubuntu.com/6961-1/
reference_id USN-6961-1
reference_type
scores
url https://usn.ubuntu.com/6961-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2023-42365
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6td-yjyg-rub4
9
url VCID-xjbx-z3d5-5bad
vulnerability_id VCID-xjbx-z3d5-5bad
summary busybox: use-after-free in awk
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42363.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42363
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07262
published_at 2026-04-13T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07286
published_at 2026-04-11T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07272
published_at 2026-04-12T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07229
published_at 2026-04-04T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07208
published_at 2026-04-07T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07263
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.0729
published_at 2026-04-09T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07441
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42363
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059050
reference_id 1059050
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059050
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252027
reference_id 2252027
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252027
6
reference_url https://usn.ubuntu.com/6961-1/
reference_id USN-6961-1
reference_type
scores
url https://usn.ubuntu.com/6961-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2023-42363
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjbx-z3d5-5bad
10
url VCID-y9hd-5med-67c4
vulnerability_id VCID-y9hd-5med-67c4
summary busybox: use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42364.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42364
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09224
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09229
published_at 2026-04-08T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09267
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09269
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09238
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09225
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09148
published_at 2026-04-07T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09473
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42364
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059051
reference_id 1059051
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059051
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2251855
reference_id 2251855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2251855
6
reference_url https://bugs.busybox.net/show_bug.cgi?id=15868
reference_id show_bug.cgi?id=15868
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T20:28:22Z/
url https://bugs.busybox.net/show_bug.cgi?id=15868
7
reference_url https://usn.ubuntu.com/6961-1/
reference_id USN-6961-1
reference_type
scores
url https://usn.ubuntu.com/6961-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2023-42364
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9hd-5med-67c4
11
url VCID-ytff-pgz4-tub2
vulnerability_id VCID-ytff-pgz4-tub2
summary busybox: CPIO command of Busybox allows attackers to execute a directory traversal
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39810.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39810
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25896
published_at 2026-04-13T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.26059
published_at 2026-04-02T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.26
published_at 2026-04-11T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25955
published_at 2026-04-12T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.261
published_at 2026-04-04T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-07T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25938
published_at 2026-04-08T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25989
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39810
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055307
reference_id 1055307
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055307
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235824
reference_id 2235824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235824
6
reference_url http://busybox.com
reference_id busybox.com
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:58:10Z/
url http://busybox.com
7
reference_url https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/
reference_id busybox-cpio-directory-traversal-vulnerability
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:58:10Z/
url https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
1
url pkg:deb/debian/busybox@1:1.37.0-10.1
purl pkg:deb/debian/busybox@1:1.37.0-10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.37.0-10.1
aliases CVE-2023-39810
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytff-pgz4-tub2
Fixing_vulnerabilities
0
url VCID-4muk-rhx5-yqeu
vulnerability_id VCID-4muk-rhx5-yqeu
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42386.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42386
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52565
published_at 2026-04-01T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52665
published_at 2026-04-13T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52608
published_at 2026-04-02T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52634
published_at 2026-04-04T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52601
published_at 2026-04-07T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52652
published_at 2026-04-08T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52647
published_at 2026-04-09T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52697
published_at 2026-04-11T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52681
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42386
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023938
reference_id 2023938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023938
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:31:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:31:59Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:31:59Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:31:59Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:31:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42386
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4muk-rhx5-yqeu
1
url VCID-4qpt-mxfy-6bh6
vulnerability_id VCID-4qpt-mxfy-6bh6
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42385.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42385
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52565
published_at 2026-04-01T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52665
published_at 2026-04-13T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52608
published_at 2026-04-02T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52634
published_at 2026-04-04T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52601
published_at 2026-04-07T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52652
published_at 2026-04-08T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52647
published_at 2026-04-09T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52697
published_at 2026-04-11T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52681
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42385
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023936
reference_id 2023936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023936
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:00Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:00Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:00Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42385
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qpt-mxfy-6bh6
2
url VCID-8r73-bpac-dubc
vulnerability_id VCID-8r73-bpac-dubc
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42377.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42377
reference_id
reference_type
scores
0
value 0.02855
scoring_system epss
scoring_elements 0.86174
published_at 2026-04-01T12:55:00Z
1
value 0.02855
scoring_system epss
scoring_elements 0.86236
published_at 2026-04-13T12:55:00Z
2
value 0.02855
scoring_system epss
scoring_elements 0.86228
published_at 2026-04-09T12:55:00Z
3
value 0.02855
scoring_system epss
scoring_elements 0.86243
published_at 2026-04-11T12:55:00Z
4
value 0.02855
scoring_system epss
scoring_elements 0.8624
published_at 2026-04-12T12:55:00Z
5
value 0.02855
scoring_system epss
scoring_elements 0.86184
published_at 2026-04-02T12:55:00Z
6
value 0.02855
scoring_system epss
scoring_elements 0.86197
published_at 2026-04-04T12:55:00Z
7
value 0.02855
scoring_system epss
scoring_elements 0.86198
published_at 2026-04-07T12:55:00Z
8
value 0.02855
scoring_system epss
scoring_elements 0.86217
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42377
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023895
reference_id 2023895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023895
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
6
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
7
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
8
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42377
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8r73-bpac-dubc
3
url VCID-92nk-cwc9-rkg4
vulnerability_id VCID-92nk-cwc9-rkg4
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42375.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42375
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19135
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19076
published_at 2026-04-13T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19269
published_at 2026-04-02T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.1932
published_at 2026-04-04T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19035
published_at 2026-04-07T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19115
published_at 2026-04-08T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19168
published_at 2026-04-09T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19175
published_at 2026-04-11T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19128
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42375
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023888
reference_id 2023888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023888
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:05Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:05Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:05Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42375
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92nk-cwc9-rkg4
4
url VCID-9fex-zr2n-w3cb
vulnerability_id VCID-9fex-zr2n-w3cb
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42384.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42384
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.4647
published_at 2026-04-01T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46535
published_at 2026-04-13T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46507
published_at 2026-04-02T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46527
published_at 2026-04-12T12:55:00Z
4
value 0.00236
scoring_system epss
scoring_elements 0.46476
published_at 2026-04-07T12:55:00Z
5
value 0.00236
scoring_system epss
scoring_elements 0.46531
published_at 2026-04-09T12:55:00Z
6
value 0.00236
scoring_system epss
scoring_elements 0.46555
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023933
reference_id 2023933
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023933
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:01Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:01Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:01Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42384
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fex-zr2n-w3cb
5
url VCID-9s28-b1gj-uqaj
vulnerability_id VCID-9s28-b1gj-uqaj
summary busybox: stack overflow vulnerability in ash.c leads to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48174.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48174
reference_id
reference_type
scores
0
value 0.00679
scoring_system epss
scoring_elements 0.71523
published_at 2026-04-02T12:55:00Z
1
value 0.00679
scoring_system epss
scoring_elements 0.71554
published_at 2026-04-13T12:55:00Z
2
value 0.00679
scoring_system epss
scoring_elements 0.71588
published_at 2026-04-11T12:55:00Z
3
value 0.00679
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-12T12:55:00Z
4
value 0.00679
scoring_system epss
scoring_elements 0.7154
published_at 2026-04-04T12:55:00Z
5
value 0.00679
scoring_system epss
scoring_elements 0.71513
published_at 2026-04-07T12:55:00Z
6
value 0.00679
scoring_system epss
scoring_elements 0.71553
published_at 2026-04-08T12:55:00Z
7
value 0.00679
scoring_system epss
scoring_elements 0.71565
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48174
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059049
reference_id 1059049
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059049
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237153
reference_id 2237153
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237153
6
reference_url https://access.redhat.com/errata/RHSA-2023:5178
reference_id RHSA-2023:5178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5178
7
reference_url https://bugs.busybox.net/show_bug.cgi?id=15216
reference_id show_bug.cgi?id=15216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-03T14:24:43Z/
url https://bugs.busybox.net/show_bug.cgi?id=15216
8
reference_url https://usn.ubuntu.com/6335-1/
reference_id USN-6335-1
reference_type
scores
url https://usn.ubuntu.com/6335-1/
9
reference_url https://usn.ubuntu.com/6961-1/
reference_id USN-6961-1
reference_type
scores
url https://usn.ubuntu.com/6961-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
1
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2022-48174
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9s28-b1gj-uqaj
6
url VCID-dse8-esmh-3ygm
vulnerability_id VCID-dse8-esmh-3ygm
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42380.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42380
reference_id
reference_type
scores
0
value 0.00452
scoring_system epss
scoring_elements 0.63711
published_at 2026-04-13T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63716
published_at 2026-04-04T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-07T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63728
published_at 2026-04-08T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63745
published_at 2026-04-12T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.63759
published_at 2026-04-11T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64309
published_at 2026-04-02T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64251
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023912
reference_id 2023912
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023912
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:07Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:07Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:07Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42380
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dse8-esmh-3ygm
7
url VCID-gdfa-8gar-47gd
vulnerability_id VCID-gdfa-8gar-47gd
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42379.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42379
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.4647
published_at 2026-04-01T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46535
published_at 2026-04-13T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46507
published_at 2026-04-02T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46527
published_at 2026-04-12T12:55:00Z
4
value 0.00236
scoring_system epss
scoring_elements 0.46476
published_at 2026-04-07T12:55:00Z
5
value 0.00236
scoring_system epss
scoring_elements 0.46531
published_at 2026-04-09T12:55:00Z
6
value 0.00236
scoring_system epss
scoring_elements 0.46555
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023904
reference_id 2023904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023904
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:08Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:08Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:08Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42379
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdfa-8gar-47gd
8
url VCID-jjxj-yf1x-4qg5
vulnerability_id VCID-jjxj-yf1x-4qg5
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42378.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42378
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.4647
published_at 2026-04-01T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46535
published_at 2026-04-13T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46507
published_at 2026-04-02T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46527
published_at 2026-04-12T12:55:00Z
4
value 0.00236
scoring_system epss
scoring_elements 0.46476
published_at 2026-04-07T12:55:00Z
5
value 0.00236
scoring_system epss
scoring_elements 0.46531
published_at 2026-04-09T12:55:00Z
6
value 0.00236
scoring_system epss
scoring_elements 0.46555
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023900
reference_id 2023900
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023900
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:10Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:10Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:10Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42378
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jjxj-yf1x-4qg5
9
url VCID-mdmz-hjvu-hke3
vulnerability_id VCID-mdmz-hjvu-hke3
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42382.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42382
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.54992
published_at 2026-04-01T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.55117
published_at 2026-04-13T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55094
published_at 2026-04-02T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55118
published_at 2026-04-04T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55093
published_at 2026-04-07T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55143
published_at 2026-04-09T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55155
published_at 2026-04-11T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55135
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023929
reference_id 2023929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023929
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:04Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:04Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:04Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42382
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mdmz-hjvu-hke3
10
url VCID-r12h-q1dj-a7b8
vulnerability_id VCID-r12h-q1dj-a7b8
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42381.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42381
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.54992
published_at 2026-04-01T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.55117
published_at 2026-04-13T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55094
published_at 2026-04-02T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55118
published_at 2026-04-04T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55093
published_at 2026-04-07T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55143
published_at 2026-04-09T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55155
published_at 2026-04-11T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55135
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42381
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023927
reference_id 2023927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023927
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:06Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:06Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:06Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42381
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r12h-q1dj-a7b8
11
url VCID-rp81-5jrg-jkht
vulnerability_id VCID-rp81-5jrg-jkht
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42373.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42373
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.2428
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24249
published_at 2026-04-13T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24331
published_at 2026-04-09T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24349
published_at 2026-04-11T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24306
published_at 2026-04-12T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24407
published_at 2026-04-02T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24439
published_at 2026-04-04T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24222
published_at 2026-04-07T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24288
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42373
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023876
reference_id 2023876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023876
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
6
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
7
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
8
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42373
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rp81-5jrg-jkht
12
url VCID-svyb-nqje-dbcs
vulnerability_id VCID-svyb-nqje-dbcs
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42383.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42383
reference_id
reference_type
scores
0
value 0.00288
scoring_system epss
scoring_elements 0.52144
published_at 2026-04-01T12:55:00Z
1
value 0.00288
scoring_system epss
scoring_elements 0.5225
published_at 2026-04-13T12:55:00Z
2
value 0.00288
scoring_system epss
scoring_elements 0.52188
published_at 2026-04-02T12:55:00Z
3
value 0.00288
scoring_system epss
scoring_elements 0.52215
published_at 2026-04-04T12:55:00Z
4
value 0.00288
scoring_system epss
scoring_elements 0.5218
published_at 2026-04-07T12:55:00Z
5
value 0.00288
scoring_system epss
scoring_elements 0.52233
published_at 2026-04-08T12:55:00Z
6
value 0.00288
scoring_system epss
scoring_elements 0.52229
published_at 2026-04-09T12:55:00Z
7
value 0.00288
scoring_system epss
scoring_elements 0.5228
published_at 2026-04-11T12:55:00Z
8
value 0.00288
scoring_system epss
scoring_elements 0.52264
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42383
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023931
reference_id 2023931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023931
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:03Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:03Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:03Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42383
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svyb-nqje-dbcs
13
url VCID-tkat-gfks-kqg9
vulnerability_id VCID-tkat-gfks-kqg9
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42374.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42374
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20042
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20022
published_at 2026-04-13T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20189
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20244
published_at 2026-04-04T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19969
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20049
published_at 2026-04-08T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20107
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20126
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.2008
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023881
reference_id 2023881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023881
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
reference_id 6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
7
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
8
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
9
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
10
reference_url https://security.netapp.com/advisory/ntap-20211223-0002/
reference_id ntap-20211223-0002
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:05Z/
url https://security.netapp.com/advisory/ntap-20211223-0002/
11
reference_url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
reference_id unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:05Z/
url https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
12
reference_url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_id unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:05Z/
url https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
reference_id UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42374
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tkat-gfks-kqg9
14
url VCID-v6td-yjyg-rub4
vulnerability_id VCID-v6td-yjyg-rub4
summary busybox: use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42365.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42365
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09224
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09269
published_at 2026-04-11T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09238
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09225
published_at 2026-04-04T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09148
published_at 2026-04-07T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09229
published_at 2026-04-08T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09267
published_at 2026-04-09T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09473
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42365
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059052
reference_id 1059052
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059052
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2251853
reference_id 2251853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2251853
6
reference_url https://usn.ubuntu.com/6961-1/
reference_id USN-6961-1
reference_type
scores
url https://usn.ubuntu.com/6961-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
1
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2023-42365
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6td-yjyg-rub4
15
url VCID-vjyq-6k64-7fat
vulnerability_id VCID-vjyq-6k64-7fat
summary Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42376.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42376
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13819
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13766
published_at 2026-04-13T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13893
published_at 2026-04-09T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13851
published_at 2026-04-11T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13815
published_at 2026-04-12T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13902
published_at 2026-04-02T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13958
published_at 2026-04-04T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.1376
published_at 2026-04-07T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13843
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42376
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2023891
reference_id 2023891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2023891
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
reference_id 999567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999567
6
reference_url https://security.archlinux.org/AVG-2561
reference_id AVG-2561
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2561
7
reference_url https://security.archlinux.org/AVG-2562
reference_id AVG-2562
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2562
8
reference_url https://security.gentoo.org/glsa/202407-17
reference_id GLSA-202407-17
reference_type
scores
url https://security.gentoo.org/glsa/202407-17
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-42376
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjyq-6k64-7fat
16
url VCID-vpmv-afzs-tffj
vulnerability_id VCID-vpmv-afzs-tffj
summary
A vulnerability in BusyBox might allow remote attackers to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28831.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28831
reference_id
reference_type
scores
0
value 0.01019
scoring_system epss
scoring_elements 0.77155
published_at 2026-04-01T12:55:00Z
1
value 0.01019
scoring_system epss
scoring_elements 0.77217
published_at 2026-04-13T12:55:00Z
2
value 0.01019
scoring_system epss
scoring_elements 0.77161
published_at 2026-04-02T12:55:00Z
3
value 0.01019
scoring_system epss
scoring_elements 0.77191
published_at 2026-04-04T12:55:00Z
4
value 0.01019
scoring_system epss
scoring_elements 0.77173
published_at 2026-04-07T12:55:00Z
5
value 0.01019
scoring_system epss
scoring_elements 0.77205
published_at 2026-04-08T12:55:00Z
6
value 0.01019
scoring_system epss
scoring_elements 0.77214
published_at 2026-04-09T12:55:00Z
7
value 0.01019
scoring_system epss
scoring_elements 0.77241
published_at 2026-04-11T12:55:00Z
8
value 0.01019
scoring_system epss
scoring_elements 0.7722
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941028
reference_id 1941028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941028
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
reference_id 3UDQGJRECXFS5EZVDH2OI45FMO436AC4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:57:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985674
reference_id 985674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985674
7
reference_url https://security.archlinux.org/ASA-202103-11
reference_id ASA-202103-11
reference_type
scores
url https://security.archlinux.org/ASA-202103-11
8
reference_url https://security.archlinux.org/ASA-202103-12
reference_id ASA-202103-12
reference_type
scores
url https://security.archlinux.org/ASA-202103-12
9
reference_url https://security.archlinux.org/AVG-1707
reference_id AVG-1707
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1707
10
reference_url https://security.archlinux.org/AVG-1708
reference_id AVG-1708
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1708
11
reference_url https://security.gentoo.org/glsa/202105-09
reference_id GLSA-202105-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:57:33Z/
url https://security.gentoo.org/glsa/202105-09
12
reference_url https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
reference_id ?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:57:33Z/
url https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
13
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:57:33Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
14
reference_url https://usn.ubuntu.com/5179-1/
reference_id USN-5179-1
reference_type
scores
url https://usn.ubuntu.com/5179-1/
15
reference_url https://usn.ubuntu.com/5179-2/
reference_id USN-5179-2
reference_type
scores
url https://usn.ubuntu.com/5179-2/
16
reference_url https://usn.ubuntu.com/6335-1/
reference_id USN-6335-1
reference_type
scores
url https://usn.ubuntu.com/6335-1/
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
reference_id Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:57:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
reference_id ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:57:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
aliases CVE-2021-28831
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpmv-afzs-tffj
17
url VCID-y9hd-5med-67c4
vulnerability_id VCID-y9hd-5med-67c4
summary busybox: use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42364.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42364
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09224
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09229
published_at 2026-04-08T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09267
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09269
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09238
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09225
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09148
published_at 2026-04-07T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09473
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42364
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059051
reference_id 1059051
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059051
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2251855
reference_id 2251855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2251855
6
reference_url https://bugs.busybox.net/show_bug.cgi?id=15868
reference_id show_bug.cgi?id=15868
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T20:28:22Z/
url https://bugs.busybox.net/show_bug.cgi?id=15868
7
reference_url https://usn.ubuntu.com/6961-1/
reference_id USN-6961-1
reference_type
scores
url https://usn.ubuntu.com/6961-1/
fixed_packages
0
url pkg:deb/debian/busybox@1:1.35.0-4
purl pkg:deb/debian/busybox@1:1.35.0-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8844-hdkd-yyc7
1
vulnerability VCID-9s28-b1gj-uqaj
2
vulnerability VCID-fugr-ve7z-efdb
3
vulnerability VCID-g5t1-3tab-uuf9
4
vulnerability VCID-jjqh-pw7r-buau
5
vulnerability VCID-n1u3-njfx-vfcp
6
vulnerability VCID-syfd-zx16-n3gy
7
vulnerability VCID-t62w-rrsb-vqgy
8
vulnerability VCID-v6td-yjyg-rub4
9
vulnerability VCID-xjbx-z3d5-5bad
10
vulnerability VCID-y9hd-5med-67c4
11
vulnerability VCID-ytff-pgz4-tub2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4
1
url pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
purl pkg:deb/debian/busybox@1:1.35.0-4%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4%252Bdeb12u1
aliases CVE-2023-42364
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9hd-5med-67c4
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/busybox@1:1.35.0-4