Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
Typedeb
Namespacedebian
Namecpio
Version2.13+dfsg-7.1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.14+dfsg-1
Latest_non_vulnerable_version2.15+dfsg-2.1
Affected_by_vulnerabilities
0
url VCID-cguy-5d2j-6yed
vulnerability_id VCID-cguy-5d2j-6yed
summary cpio: path traversal vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7207.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-7207
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.18927
published_at 2026-04-21T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19191
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18907
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18986
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1904
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19048
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19001
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18949
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18903
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18916
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-7207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/01/05/1
reference_id 1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/
url http://www.openwall.com/lists/oss-security/2024/01/05/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163
reference_id 1059163
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2266856
reference_id 2266856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2266856
7
reference_url https://www.openwall.com/lists/oss-security/2023/12/21/8
reference_id 8
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/
url https://www.openwall.com/lists/oss-security/2023/12/21/8
8
reference_url https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628
reference_id ?id=376d663340a9dc91c91a5849e5713f07571c1628
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/
url https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628
9
reference_url https://usn.ubuntu.com/6755-1/
reference_id USN-6755-1
reference_type
scores
url https://usn.ubuntu.com/6755-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.14%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/cpio@2.14%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.14%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2023-7207
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cguy-5d2j-6yed
Fixing_vulnerabilities
0
url VCID-156j-33gz-xkdf
vulnerability_id VCID-156j-33gz-xkdf
summary security flaw
references
0
reference_url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
reference_id
reference_type
scores
url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt
2
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt
3
reference_url http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
4
reference_url http://marc.info/?l=bugtraq&m=111342664116120&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=111342664116120&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1111.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1111.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1111
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.25909
published_at 2026-04-21T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25957
published_at 2026-04-16T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25938
published_at 2026-04-18T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26036
published_at 2026-04-01T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.2612
published_at 2026-04-02T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2616
published_at 2026-04-04T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.25929
published_at 2026-04-07T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.25997
published_at 2026-04-08T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26048
published_at 2026-04-09T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26057
published_at 2026-04-11T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-12T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25953
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1111
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111
8
reference_url http://secunia.com/advisories/16998
reference_id
reference_type
scores
url http://secunia.com/advisories/16998
9
reference_url http://secunia.com/advisories/17123
reference_id
reference_type
scores
url http://secunia.com/advisories/17123
10
reference_url http://secunia.com/advisories/17532
reference_id
reference_type
scores
url http://secunia.com/advisories/17532
11
reference_url http://secunia.com/advisories/18290
reference_id
reference_type
scores
url http://secunia.com/advisories/18290
12
reference_url http://secunia.com/advisories/18395
reference_id
reference_type
scores
url http://secunia.com/advisories/18395
13
reference_url http://secunia.com/advisories/20117
reference_id
reference_type
scores
url http://secunia.com/advisories/20117
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A358
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A358
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9783
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9783
16
reference_url http://www.debian.org/security/2005/dsa-846
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-846
17
reference_url http://www.osvdb.org/15725
reference_id
reference_type
scores
url http://www.osvdb.org/15725
18
reference_url http://www.redhat.com/support/errata/RHSA-2005-378.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-378.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2005-806.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-806.html
20
reference_url http://www.securityfocus.com/bid/13159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13159
21
reference_url http://www.ubuntu.com/usn/usn-189-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-189-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617604
reference_id 1617604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617604
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305372
reference_id 305372
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305372
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1111
reference_id CVE-2005-1111
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-1111
30
reference_url https://access.redhat.com/errata/RHSA-2005:378
reference_id RHSA-2005:378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:378
31
reference_url https://access.redhat.com/errata/RHSA-2005:806
reference_id RHSA-2005:806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:806
32
reference_url https://usn.ubuntu.com/189-1/
reference_id USN-189-1
reference_type
scores
url https://usn.ubuntu.com/189-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.6-6?distro=trixie
purl pkg:deb/debian/cpio@2.6-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.6-6%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2005-1111
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-156j-33gz-xkdf
1
url VCID-5rck-gs8y-87bb
vulnerability_id VCID-5rck-gs8y-87bb
summary A vulnerability has been discovered in cpio, which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2037.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2037.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2037
reference_id
reference_type
scores
0
value 0.19449
scoring_system epss
scoring_elements 0.95352
published_at 2026-04-01T12:55:00Z
1
value 0.19449
scoring_system epss
scoring_elements 0.95403
published_at 2026-04-21T12:55:00Z
2
value 0.19449
scoring_system epss
scoring_elements 0.95386
published_at 2026-04-12T12:55:00Z
3
value 0.19449
scoring_system epss
scoring_elements 0.95389
published_at 2026-04-13T12:55:00Z
4
value 0.19449
scoring_system epss
scoring_elements 0.95396
published_at 2026-04-16T12:55:00Z
5
value 0.19449
scoring_system epss
scoring_elements 0.954
published_at 2026-04-18T12:55:00Z
6
value 0.19449
scoring_system epss
scoring_elements 0.95361
published_at 2026-04-02T12:55:00Z
7
value 0.19449
scoring_system epss
scoring_elements 0.95367
published_at 2026-04-04T12:55:00Z
8
value 0.19449
scoring_system epss
scoring_elements 0.95372
published_at 2026-04-07T12:55:00Z
9
value 0.19449
scoring_system epss
scoring_elements 0.95379
published_at 2026-04-08T12:55:00Z
10
value 0.19449
scoring_system epss
scoring_elements 0.95381
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2037
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.debian.org/security/2016/dsa-3483
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3483
5
reference_url http://www.openwall.com/lists/oss-security/2016/01/19/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/19/4
6
reference_url http://www.openwall.com/lists/oss-security/2016/01/22/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/22/4
7
reference_url http://www.securityfocus.com/bid/82293
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82293
8
reference_url http://www.securitytracker.com/id/1035067
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035067
9
reference_url http://www.ubuntu.com/usn/USN-2906-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2906-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1300207
reference_id 1300207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1300207
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812401
reference_id 812401
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812401
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2037
reference_id CVE-2016-2037
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2037
16
reference_url https://security.gentoo.org/glsa/202407-07
reference_id GLSA-202407-07
reference_type
scores
url https://security.gentoo.org/glsa/202407-07
17
reference_url https://usn.ubuntu.com/2906-1/
reference_id USN-2906-1
reference_type
scores
url https://usn.ubuntu.com/2906-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.11%2Bdfsg-5?distro=trixie
purl pkg:deb/debian/cpio@2.11%2Bdfsg-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11%252Bdfsg-5%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2016-2037
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rck-gs8y-87bb
2
url VCID-7qhn-kqw8-puac
vulnerability_id VCID-7qhn-kqw8-puac
summary cpio large filesize buffer overflow
references
0
reference_url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
reference_id
reference_type
scores
url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
1
reference_url http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237
reference_id
reference_type
scores
url http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237
2
reference_url http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4268.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4268.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4268
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15601
published_at 2026-04-21T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15695
published_at 2026-04-01T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15734
published_at 2026-04-02T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15798
published_at 2026-04-04T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15604
published_at 2026-04-07T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15689
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15748
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15714
published_at 2026-04-11T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15679
published_at 2026-04-12T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15615
published_at 2026-04-13T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15541
published_at 2026-04-16T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15551
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4268
5
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4268
7
reference_url http://secunia.com/advisories/18251
reference_id
reference_type
scores
url http://secunia.com/advisories/18251
8
reference_url http://secunia.com/advisories/18278
reference_id
reference_type
scores
url http://secunia.com/advisories/18278
9
reference_url http://secunia.com/advisories/18280
reference_id
reference_type
scores
url http://secunia.com/advisories/18280
10
reference_url http://secunia.com/advisories/18395
reference_id
reference_type
scores
url http://secunia.com/advisories/18395
11
reference_url http://secunia.com/advisories/20117
reference_id
reference_type
scores
url http://secunia.com/advisories/20117
12
reference_url http://secunia.com/advisories/25098
reference_id
reference_type
scores
url http://secunia.com/advisories/25098
13
reference_url http://secunia.com/advisories/25161
reference_id
reference_type
scores
url http://secunia.com/advisories/25161
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23855
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23855
15
reference_url https://issues.rpath.com/browse/RPL-1338
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1338
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860
18
reference_url http://www.osvdb.org/22194
reference_id
reference_type
scores
url http://www.osvdb.org/22194
19
reference_url http://www.redhat.com/support/errata/RHSA-2007-0245.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0245.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0145.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0145.html
21
reference_url http://www.securityfocus.com/bid/16057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16057
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=229191
reference_id 229191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=229191
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344134
reference_id 344134
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344134
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:*
reference_id cpe:2.3:a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4268
reference_id CVE-2005-4268
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4268
26
reference_url https://access.redhat.com/errata/RHSA-2007:0245
reference_id RHSA-2007:0245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0245
27
reference_url https://access.redhat.com/errata/RHSA-2010:0145
reference_id RHSA-2010:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0145
28
reference_url https://usn.ubuntu.com/234-1/
reference_id USN-234-1
reference_type
scores
url https://usn.ubuntu.com/234-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.6-10?distro=trixie
purl pkg:deb/debian/cpio@2.6-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.6-10%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2005-4268
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qhn-kqw8-puac
3
url VCID-93ev-1sjh-h7ab
vulnerability_id VCID-93ev-1sjh-h7ab
summary cpio directory traversal issue
references
0
reference_url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
reference_id
reference_type
scores
url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt
2
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt
3
reference_url http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
4
reference_url http://marc.info/?l=bugtraq&m=111403177526312&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=111403177526312&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1229.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1229.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1229
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-21T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.76455
published_at 2026-04-01T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76459
published_at 2026-04-02T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76488
published_at 2026-04-04T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.7647
published_at 2026-04-07T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76502
published_at 2026-04-08T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76514
published_at 2026-04-09T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.7654
published_at 2026-04-11T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76518
published_at 2026-04-12T12:55:00Z
9
value 0.00962
scoring_system epss
scoring_elements 0.76513
published_at 2026-04-13T12:55:00Z
10
value 0.00962
scoring_system epss
scoring_elements 0.76554
published_at 2026-04-16T12:55:00Z
11
value 0.00962
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1229
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1229
8
reference_url http://secunia.com/advisories/16998
reference_id
reference_type
scores
url http://secunia.com/advisories/16998
9
reference_url http://secunia.com/advisories/17123
reference_id
reference_type
scores
url http://secunia.com/advisories/17123
10
reference_url http://secunia.com/advisories/18290
reference_id
reference_type
scores
url http://secunia.com/advisories/18290
11
reference_url http://secunia.com/advisories/18395
reference_id
reference_type
scores
url http://secunia.com/advisories/18395
12
reference_url http://secunia.com/advisories/20117
reference_id
reference_type
scores
url http://secunia.com/advisories/20117
13
reference_url http://secunia.com/advisories/27857
reference_id
reference_type
scores
url http://secunia.com/advisories/27857
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/20204
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/20204
15
reference_url http://www.debian.org/security/2005/dsa-846
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-846
16
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:233
17
reference_url http://www.osvdb.org/17939
reference_id
reference_type
scores
url http://www.osvdb.org/17939
18
reference_url http://www.securityfocus.com/bid/13291
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13291
19
reference_url http://www.ubuntu.com/usn/usn-189-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-189-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=156313
reference_id 156313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=156313
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=306693
reference_id 306693
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=306693
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1229
reference_id CVE-2005-1229
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1229
24
reference_url https://usn.ubuntu.com/189-1/
reference_id USN-189-1
reference_type
scores
url https://usn.ubuntu.com/189-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.6-6?distro=trixie
purl pkg:deb/debian/cpio@2.6-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.6-6%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2005-1229
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-93ev-1sjh-h7ab
4
url VCID-99j7-3sya-n3bx
vulnerability_id VCID-99j7-3sya-n3bx
summary A vulnerability has been discovered in cpio, which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38185.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38185
reference_id
reference_type
scores
0
value 0.26706
scoring_system epss
scoring_elements 0.96304
published_at 2026-04-01T12:55:00Z
1
value 0.26706
scoring_system epss
scoring_elements 0.96357
published_at 2026-04-21T12:55:00Z
2
value 0.26706
scoring_system epss
scoring_elements 0.96312
published_at 2026-04-02T12:55:00Z
3
value 0.26706
scoring_system epss
scoring_elements 0.96319
published_at 2026-04-04T12:55:00Z
4
value 0.26706
scoring_system epss
scoring_elements 0.96324
published_at 2026-04-07T12:55:00Z
5
value 0.26706
scoring_system epss
scoring_elements 0.96332
published_at 2026-04-08T12:55:00Z
6
value 0.26706
scoring_system epss
scoring_elements 0.96336
published_at 2026-04-09T12:55:00Z
7
value 0.26706
scoring_system epss
scoring_elements 0.9634
published_at 2026-04-11T12:55:00Z
8
value 0.26706
scoring_system epss
scoring_elements 0.96339
published_at 2026-04-12T12:55:00Z
9
value 0.26706
scoring_system epss
scoring_elements 0.96342
published_at 2026-04-13T12:55:00Z
10
value 0.26706
scoring_system epss
scoring_elements 0.96351
published_at 2026-04-16T12:55:00Z
11
value 0.26706
scoring_system epss
scoring_elements 0.96355
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1991731
reference_id 1991731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1991731
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992045
reference_id 992045
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992045
6
reference_url https://security.archlinux.org/AVG-2262
reference_id AVG-2262
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2262
7
reference_url https://github.com/fangqyi/cpiopwn
reference_id cpiopwn
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/
url https://github.com/fangqyi/cpiopwn
8
reference_url https://security.gentoo.org/glsa/202407-07
reference_id GLSA-202407-07
reference_type
scores
url https://security.gentoo.org/glsa/202407-07
9
reference_url https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
reference_id ?id=dd96882877721703e19272fe25034560b794061b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/
url https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
10
reference_url https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/
url https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
11
reference_url https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/
url https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
12
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
13
reference_url https://access.redhat.com/errata/RHSA-2022:1991
reference_id RHSA-2022:1991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1991
14
reference_url https://usn.ubuntu.com/5064-1/
reference_id USN-5064-1
reference_type
scores
url https://usn.ubuntu.com/5064-1/
15
reference_url https://usn.ubuntu.com/5064-2/
reference_id USN-5064-2
reference_type
scores
url https://usn.ubuntu.com/5064-2/
16
reference_url https://usn.ubuntu.com/5064-3/
reference_id USN-5064-3
reference_type
scores
url https://usn.ubuntu.com/5064-3/
fixed_packages
0
url pkg:deb/debian/cpio@2.13%2Bdfsg-5?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-5%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2021-38185
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-99j7-3sya-n3bx
5
url VCID-epu2-8s66-sqcw
vulnerability_id VCID-epu2-8s66-sqcw
summary A vulnerability has been discovered in cpio, which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14866.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14866
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09213
published_at 2026-04-01T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09214
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0926
published_at 2026-04-04T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09186
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09265
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09309
published_at 2026-04-09T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09315
published_at 2026-04-11T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09285
published_at 2026-04-12T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09272
published_at 2026-04-13T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09165
published_at 2026-04-16T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0916
published_at 2026-04-18T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09313
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14866
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1765511
reference_id 1765511
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1765511
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941412
reference_id 941412
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941412
6
reference_url https://security.gentoo.org/glsa/202407-07
reference_id GLSA-202407-07
reference_type
scores
url https://security.gentoo.org/glsa/202407-07
7
reference_url https://access.redhat.com/errata/RHSA-2020:3908
reference_id RHSA-2020:3908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3908
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://access.redhat.com/errata/RHSA-2021:1582
reference_id RHSA-2021:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1582
10
reference_url https://access.redhat.com/errata/RHSA-2022:0073
reference_id RHSA-2022:0073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0073
11
reference_url https://usn.ubuntu.com/4176-1/
reference_id USN-4176-1
reference_type
scores
url https://usn.ubuntu.com/4176-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.13%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2019-14866
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epu2-8s66-sqcw
6
url VCID-ft5f-trap-43fa
vulnerability_id VCID-ft5f-trap-43fa
summary
GNU cpio contains a buffer overflow vulnerability, possibly resulting in a
    Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4476.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4476
reference_id
reference_type
scores
0
value 0.11809
scoring_system epss
scoring_elements 0.93675
published_at 2026-04-01T12:55:00Z
1
value 0.11809
scoring_system epss
scoring_elements 0.93685
published_at 2026-04-02T12:55:00Z
2
value 0.11809
scoring_system epss
scoring_elements 0.93696
published_at 2026-04-04T12:55:00Z
3
value 0.11809
scoring_system epss
scoring_elements 0.93698
published_at 2026-04-07T12:55:00Z
4
value 0.11809
scoring_system epss
scoring_elements 0.93707
published_at 2026-04-08T12:55:00Z
5
value 0.11809
scoring_system epss
scoring_elements 0.93709
published_at 2026-04-09T12:55:00Z
6
value 0.11809
scoring_system epss
scoring_elements 0.93714
published_at 2026-04-12T12:55:00Z
7
value 0.11809
scoring_system epss
scoring_elements 0.93715
published_at 2026-04-13T12:55:00Z
8
value 0.11809
scoring_system epss
scoring_elements 0.93732
published_at 2026-04-16T12:55:00Z
9
value 0.11809
scoring_system epss
scoring_elements 0.93739
published_at 2026-04-18T12:55:00Z
10
value 0.11809
scoring_system epss
scoring_elements 0.93742
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=280961
reference_id 280961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=280961
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441444
reference_id 441444
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441444
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449222
reference_id 449222
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449222
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30766.c
reference_id CVE-2007-4476;OSVDB-42149
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30766.c
7
reference_url https://www.securityfocus.com/bid/26445/info
reference_id CVE-2007-4476;OSVDB-42149
reference_type exploit
scores
url https://www.securityfocus.com/bid/26445/info
8
reference_url https://security.gentoo.org/glsa/200711-18
reference_id GLSA-200711-18
reference_type
scores
url https://security.gentoo.org/glsa/200711-18
9
reference_url https://access.redhat.com/errata/RHSA-2010:0141
reference_id RHSA-2010:0141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0141
10
reference_url https://access.redhat.com/errata/RHSA-2010:0144
reference_id RHSA-2010:0144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0144
11
reference_url https://usn.ubuntu.com/650-1/
reference_id USN-650-1
reference_type
scores
url https://usn.ubuntu.com/650-1/
12
reference_url https://usn.ubuntu.com/709-1/
reference_id USN-709-1
reference_type
scores
url https://usn.ubuntu.com/709-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.9-5?distro=trixie
purl pkg:deb/debian/cpio@2.9-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.9-5%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2007-4476
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ft5f-trap-43fa
7
url VCID-mdgb-2uxr-hyg1
vulnerability_id VCID-mdgb-2uxr-hyg1
summary
Two vulnerabilities have been found in GNU cpio, the worst of which
    could result in execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9112.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9112.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9112
reference_id
reference_type
scores
0
value 0.01343
scoring_system epss
scoring_elements 0.80068
published_at 2026-04-21T12:55:00Z
1
value 0.01343
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-01T12:55:00Z
2
value 0.01343
scoring_system epss
scoring_elements 0.79995
published_at 2026-04-02T12:55:00Z
3
value 0.01343
scoring_system epss
scoring_elements 0.80017
published_at 2026-04-04T12:55:00Z
4
value 0.01343
scoring_system epss
scoring_elements 0.80007
published_at 2026-04-07T12:55:00Z
5
value 0.01343
scoring_system epss
scoring_elements 0.80035
published_at 2026-04-08T12:55:00Z
6
value 0.01343
scoring_system epss
scoring_elements 0.80043
published_at 2026-04-09T12:55:00Z
7
value 0.01343
scoring_system epss
scoring_elements 0.80063
published_at 2026-04-11T12:55:00Z
8
value 0.01343
scoring_system epss
scoring_elements 0.80048
published_at 2026-04-12T12:55:00Z
9
value 0.01343
scoring_system epss
scoring_elements 0.80039
published_at 2026-04-13T12:55:00Z
10
value 0.01343
scoring_system epss
scoring_elements 0.80067
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9112
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112
3
reference_url http://seclists.org/fulldisclosure/2014/Nov/74
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Nov/74
4
reference_url http://secunia.com/advisories/60167
reference_id
reference_type
scores
url http://secunia.com/advisories/60167
5
reference_url http://secunia.com/advisories/62145
reference_id
reference_type
scores
url http://secunia.com/advisories/62145
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/98918
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/98918
7
reference_url https://savannah.gnu.org/bugs/?43709
reference_id
reference_type
scores
url https://savannah.gnu.org/bugs/?43709
8
reference_url http://www.debian.org/security/2014/dsa-3111
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3111
9
reference_url http://www.openwall.com/lists/oss-security/2014/11/23/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/11/23/2
10
reference_url http://www.openwall.com/lists/oss-security/2014/11/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/11/25/2
11
reference_url http://www.openwall.com/lists/oss-security/2014/11/26/20
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/11/26/20
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
13
reference_url http://www.securityfocus.com/bid/71248
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71248
14
reference_url http://www.ubuntu.com/usn/USN-2456-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2456-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1167571
reference_id 1167571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1167571
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772793
reference_id 772793
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772793
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9112
reference_id CVE-2014-9112
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9112
20
reference_url https://security.gentoo.org/glsa/201502-11
reference_id GLSA-201502-11
reference_type
scores
url https://security.gentoo.org/glsa/201502-11
21
reference_url https://access.redhat.com/errata/RHSA-2015:2108
reference_id RHSA-2015:2108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2108
22
reference_url https://usn.ubuntu.com/2456-1/
reference_id USN-2456-1
reference_type
scores
url https://usn.ubuntu.com/2456-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.11%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/cpio@2.11%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11%252Bdfsg-4%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2014-9112
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mdgb-2uxr-hyg1
8
url VCID-qv55-fc5j-dyew
vulnerability_id VCID-qv55-fc5j-dyew
summary security flaw
references
0
reference_url http://marc.info/?l=bugtraq&m=110763404701519&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110763404701519&w=2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-1572.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-1572.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-1999-1572
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34031
published_at 2026-04-21T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33807
published_at 2026-04-01T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34145
published_at 2026-04-02T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34177
published_at 2026-04-04T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34037
published_at 2026-04-07T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.3408
published_at 2026-04-08T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34111
published_at 2026-04-09T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.34109
published_at 2026-04-11T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.34067
published_at 2026-04-18T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.34044
published_at 2026-04-13T12:55:00Z
10
value 0.00139
scoring_system epss
scoring_elements 0.34079
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-1999-1572
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1572
4
reference_url http://secunia.com/advisories/14357
reference_id
reference_type
scores
url http://secunia.com/advisories/14357
5
reference_url http://secunia.com/advisories/17063
reference_id
reference_type
scores
url http://secunia.com/advisories/17063
6
reference_url http://secunia.com/advisories/17532
reference_id
reference_type
scores
url http://secunia.com/advisories/17532
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19167
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19167
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888
9
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf
10
reference_url http://www.debian.org/security/2005/dsa-664
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-664
11
reference_url http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391
reference_id
reference_type
scores
url http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391
12
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:032
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:032
13
reference_url http://www.redhat.com/support/errata/RHSA-2005-073.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-073.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2005-080.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-080.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2005-806.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-806.html
16
reference_url http://www.trustix.org/errata/2005/0003/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0003/
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616458
reference_id 1616458
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616458
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=293379
reference_id 293379
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=293379
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-1999-1572
reference_id CVE-1999-1572
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-1999-1572
32
reference_url https://access.redhat.com/errata/RHSA-2005:073
reference_id RHSA-2005:073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:073
33
reference_url https://access.redhat.com/errata/RHSA-2005:080
reference_id RHSA-2005:080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:080
34
reference_url https://access.redhat.com/errata/RHSA-2005:806
reference_id RHSA-2005:806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:806
35
reference_url https://usn.ubuntu.com/75-1/
reference_id USN-75-1
reference_type
scores
url https://usn.ubuntu.com/75-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.5-1.2?distro=trixie
purl pkg:deb/debian/cpio@2.5-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.5-1.2%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-1999-1572
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv55-fc5j-dyew
9
url VCID-tyqd-yqrc-bygr
vulnerability_id VCID-tyqd-yqrc-bygr
summary
Two vulnerabilities have been found in GNU cpio, the worst of which
    could result in execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1197.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1197.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1197
reference_id
reference_type
scores
0
value 0.03332
scoring_system epss
scoring_elements 0.87236
published_at 2026-04-01T12:55:00Z
1
value 0.03332
scoring_system epss
scoring_elements 0.87246
published_at 2026-04-02T12:55:00Z
2
value 0.03332
scoring_system epss
scoring_elements 0.87262
published_at 2026-04-04T12:55:00Z
3
value 0.03332
scoring_system epss
scoring_elements 0.87259
published_at 2026-04-07T12:55:00Z
4
value 0.03332
scoring_system epss
scoring_elements 0.87278
published_at 2026-04-08T12:55:00Z
5
value 0.03332
scoring_system epss
scoring_elements 0.87286
published_at 2026-04-09T12:55:00Z
6
value 0.03332
scoring_system epss
scoring_elements 0.87299
published_at 2026-04-11T12:55:00Z
7
value 0.03332
scoring_system epss
scoring_elements 0.87293
published_at 2026-04-12T12:55:00Z
8
value 0.03332
scoring_system epss
scoring_elements 0.87289
published_at 2026-04-13T12:55:00Z
9
value 0.03332
scoring_system epss
scoring_elements 0.87303
published_at 2026-04-16T12:55:00Z
10
value 0.03332
scoring_system epss
scoring_elements 0.87308
published_at 2026-04-18T12:55:00Z
11
value 0.03332
scoring_system epss
scoring_elements 0.87302
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1197
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179773
reference_id 1179773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179773
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
reference_id 774669
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
5
reference_url https://security.gentoo.org/glsa/201502-11
reference_id GLSA-201502-11
reference_type
scores
url https://security.gentoo.org/glsa/201502-11
6
reference_url https://usn.ubuntu.com/2906-1/
reference_id USN-2906-1
reference_type
scores
url https://usn.ubuntu.com/2906-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.11%2Bdfsg-4.1?distro=trixie
purl pkg:deb/debian/cpio@2.11%2Bdfsg-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11%252Bdfsg-4.1%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2015-1197
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyqd-yqrc-bygr
10
url VCID-zakj-27p6-6kbf
vulnerability_id VCID-zakj-27p6-6kbf
summary
A buffer overflow flaw in GNU Tar could result in execution of
    arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0624.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0624
reference_id
reference_type
scores
0
value 0.01474
scoring_system epss
scoring_elements 0.80894
published_at 2026-04-01T12:55:00Z
1
value 0.01474
scoring_system epss
scoring_elements 0.80902
published_at 2026-04-02T12:55:00Z
2
value 0.01474
scoring_system epss
scoring_elements 0.80925
published_at 2026-04-04T12:55:00Z
3
value 0.01474
scoring_system epss
scoring_elements 0.80923
published_at 2026-04-07T12:55:00Z
4
value 0.01474
scoring_system epss
scoring_elements 0.80951
published_at 2026-04-13T12:55:00Z
5
value 0.01474
scoring_system epss
scoring_elements 0.80958
published_at 2026-04-09T12:55:00Z
6
value 0.01474
scoring_system epss
scoring_elements 0.80973
published_at 2026-04-11T12:55:00Z
7
value 0.01474
scoring_system epss
scoring_elements 0.8096
published_at 2026-04-12T12:55:00Z
8
value 0.01474
scoring_system epss
scoring_elements 0.80988
published_at 2026-04-16T12:55:00Z
9
value 0.01474
scoring_system epss
scoring_elements 0.8099
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=564368
reference_id 564368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=564368
4
reference_url https://security.gentoo.org/glsa/201111-11
reference_id GLSA-201111-11
reference_type
scores
url https://security.gentoo.org/glsa/201111-11
5
reference_url https://security.gentoo.org/glsa/201311-21
reference_id GLSA-201311-21
reference_type
scores
url https://security.gentoo.org/glsa/201311-21
6
reference_url https://access.redhat.com/errata/RHSA-2010:0141
reference_id RHSA-2010:0141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0141
7
reference_url https://access.redhat.com/errata/RHSA-2010:0142
reference_id RHSA-2010:0142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0142
8
reference_url https://access.redhat.com/errata/RHSA-2010:0143
reference_id RHSA-2010:0143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0143
9
reference_url https://access.redhat.com/errata/RHSA-2010:0144
reference_id RHSA-2010:0144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0144
10
reference_url https://access.redhat.com/errata/RHSA-2010:0145
reference_id RHSA-2010:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0145
11
reference_url https://usn.ubuntu.com/2456-1/
reference_id USN-2456-1
reference_type
scores
url https://usn.ubuntu.com/2456-1/
fixed_packages
0
url pkg:deb/debian/cpio@2.11-1?distro=trixie
purl pkg:deb/debian/cpio@2.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11-1%3Fdistro=trixie
1
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
purl pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cguy-5d2j-6yed
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie
3
url pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie
aliases CVE-2010-0624
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zakj-27p6-6kbf
Risk_score2.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie