Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Nameclamav
Version0.97.5+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.97.7+dfsg-1
Latest_non_vulnerable_version1.4.4+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6vfe-sqh5-33fd
vulnerability_id VCID-6vfe-sqh5-33fd
summary The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
1
reference_url http://osvdb.org/80389
reference_id
reference_type
scores
url http://osvdb.org/80389
2
reference_url http://osvdb.org/80390
reference_id
reference_type
scores
url http://osvdb.org/80390
3
reference_url http://osvdb.org/80391
reference_id
reference_type
scores
url http://osvdb.org/80391
4
reference_url http://osvdb.org/80392
reference_id
reference_type
scores
url http://osvdb.org/80392
5
reference_url http://osvdb.org/80393
reference_id
reference_type
scores
url http://osvdb.org/80393
6
reference_url http://osvdb.org/80395
reference_id
reference_type
scores
url http://osvdb.org/80395
7
reference_url http://osvdb.org/80396
reference_id
reference_type
scores
url http://osvdb.org/80396
8
reference_url http://osvdb.org/80403
reference_id
reference_type
scores
url http://osvdb.org/80403
9
reference_url http://osvdb.org/80406
reference_id
reference_type
scores
url http://osvdb.org/80406
10
reference_url http://osvdb.org/80407
reference_id
reference_type
scores
url http://osvdb.org/80407
11
reference_url http://osvdb.org/80409
reference_id
reference_type
scores
url http://osvdb.org/80409
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1459
reference_id
reference_type
scores
0
value 0.7955
scoring_system epss
scoring_elements 0.99076
published_at 2026-04-01T12:55:00Z
1
value 0.7955
scoring_system epss
scoring_elements 0.99077
published_at 2026-04-02T12:55:00Z
2
value 0.7955
scoring_system epss
scoring_elements 0.99081
published_at 2026-04-04T12:55:00Z
3
value 0.7955
scoring_system epss
scoring_elements 0.99083
published_at 2026-04-07T12:55:00Z
4
value 0.7955
scoring_system epss
scoring_elements 0.99084
published_at 2026-04-08T12:55:00Z
5
value 0.7955
scoring_system epss
scoring_elements 0.99085
published_at 2026-04-09T12:55:00Z
6
value 0.7955
scoring_system epss
scoring_elements 0.99086
published_at 2026-04-11T12:55:00Z
7
value 0.7955
scoring_system epss
scoring_elements 0.99087
published_at 2026-04-13T12:55:00Z
8
value 0.7955
scoring_system epss
scoring_elements 0.99088
published_at 2026-04-16T12:55:00Z
9
value 0.7955
scoring_system epss
scoring_elements 0.99089
published_at 2026-04-18T12:55:00Z
10
value 0.7955
scoring_system epss
scoring_elements 0.99091
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1459
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/74302
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/74302
15
reference_url http://www.ieee-security.org/TC/SP2012/program.html
reference_id
reference_type
scores
url http://www.ieee-security.org/TC/SP2012/program.html
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:094
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:094
17
reference_url http://www.securityfocus.com/archive/1/522005
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/522005
18
reference_url http://www.securityfocus.com/bid/52623
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/52623
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
reference_id 668273
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
20
reference_url https://usn.ubuntu.com/1482-1/
reference_id USN-1482-1
reference_type
scores
url https://usn.ubuntu.com/1482-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.97.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2%3Fdistro=trixie
3
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.4%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1459, PYSEC-2012-26
risk_score 0.3
exploitability 0.5
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vfe-sqh5-33fd
1
url VCID-b8av-4cra-33em
vulnerability_id VCID-b8av-4cra-33em
summary The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
1
reference_url http://osvdb.org/80389
reference_id
reference_type
scores
url http://osvdb.org/80389
2
reference_url http://osvdb.org/80391
reference_id
reference_type
scores
url http://osvdb.org/80391
3
reference_url http://osvdb.org/80392
reference_id
reference_type
scores
url http://osvdb.org/80392
4
reference_url http://osvdb.org/80393
reference_id
reference_type
scores
url http://osvdb.org/80393
5
reference_url http://osvdb.org/80395
reference_id
reference_type
scores
url http://osvdb.org/80395
6
reference_url http://osvdb.org/80396
reference_id
reference_type
scores
url http://osvdb.org/80396
7
reference_url http://osvdb.org/80403
reference_id
reference_type
scores
url http://osvdb.org/80403
8
reference_url http://osvdb.org/80406
reference_id
reference_type
scores
url http://osvdb.org/80406
9
reference_url http://osvdb.org/80407
reference_id
reference_type
scores
url http://osvdb.org/80407
10
reference_url http://osvdb.org/80409
reference_id
reference_type
scores
url http://osvdb.org/80409
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1457
reference_id
reference_type
scores
0
value 0.50848
scoring_system epss
scoring_elements 0.97841
published_at 2026-04-01T12:55:00Z
1
value 0.50848
scoring_system epss
scoring_elements 0.97846
published_at 2026-04-02T12:55:00Z
2
value 0.50848
scoring_system epss
scoring_elements 0.97848
published_at 2026-04-04T12:55:00Z
3
value 0.50848
scoring_system epss
scoring_elements 0.97851
published_at 2026-04-07T12:55:00Z
4
value 0.50848
scoring_system epss
scoring_elements 0.97855
published_at 2026-04-08T12:55:00Z
5
value 0.50848
scoring_system epss
scoring_elements 0.97858
published_at 2026-04-09T12:55:00Z
6
value 0.50848
scoring_system epss
scoring_elements 0.97861
published_at 2026-04-11T12:55:00Z
7
value 0.50848
scoring_system epss
scoring_elements 0.97862
published_at 2026-04-12T12:55:00Z
8
value 0.50848
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-13T12:55:00Z
9
value 0.50848
scoring_system epss
scoring_elements 0.97871
published_at 2026-04-21T12:55:00Z
10
value 0.50848
scoring_system epss
scoring_elements 0.97872
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1457
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/74293
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/74293
14
reference_url http://www.ieee-security.org/TC/SP2012/program.html
reference_id
reference_type
scores
url http://www.ieee-security.org/TC/SP2012/program.html
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:094
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:094
16
reference_url http://www.securityfocus.com/archive/1/522005
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/522005
17
reference_url http://www.securityfocus.com/bid/52610
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/52610
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
reference_id 668273
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
19
reference_url https://usn.ubuntu.com/1482-1/
reference_id USN-1482-1
reference_type
scores
url https://usn.ubuntu.com/1482-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.97.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2%3Fdistro=trixie
3
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.4%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1457, PYSEC-2012-25
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8av-4cra-33em
2
url VCID-qvz2-bk3f-7bch
vulnerability_id VCID-qvz2-bk3f-7bch
summary The TAR file parser in ClamAV 0.96.4 and Quick Heal (aka Cat QuickHeal) 11.00 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial [aliases] character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1419
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74112
published_at 2026-04-01T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74117
published_at 2026-04-02T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.74143
published_at 2026-04-04T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74115
published_at 2026-04-07T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74148
published_at 2026-04-08T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74162
published_at 2026-04-09T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74184
published_at 2026-04-11T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74166
published_at 2026-04-12T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74159
published_at 2026-04-13T12:55:00Z
9
value 0.00806
scoring_system epss
scoring_elements 0.74197
published_at 2026-04-16T12:55:00Z
10
value 0.00806
scoring_system epss
scoring_elements 0.74206
published_at 2026-04-18T12:55:00Z
11
value 0.00806
scoring_system epss
scoring_elements 0.74198
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1419
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1419
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
reference_id 668273
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
fixed_packages
0
url pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.97.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2%3Fdistro=trixie
3
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.4%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1419
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qvz2-bk3f-7bch
3
url VCID-sbbh-2bet-gyaz
vulnerability_id VCID-sbbh-2bet-gyaz
summary The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1458
reference_id
reference_type
scores
0
value 0.08119
scoring_system epss
scoring_elements 0.9213
published_at 2026-04-01T12:55:00Z
1
value 0.08119
scoring_system epss
scoring_elements 0.92137
published_at 2026-04-02T12:55:00Z
2
value 0.08119
scoring_system epss
scoring_elements 0.92144
published_at 2026-04-04T12:55:00Z
3
value 0.08119
scoring_system epss
scoring_elements 0.92148
published_at 2026-04-07T12:55:00Z
4
value 0.08119
scoring_system epss
scoring_elements 0.92159
published_at 2026-04-08T12:55:00Z
5
value 0.08119
scoring_system epss
scoring_elements 0.92162
published_at 2026-04-09T12:55:00Z
6
value 0.08119
scoring_system epss
scoring_elements 0.92167
published_at 2026-04-12T12:55:00Z
7
value 0.08119
scoring_system epss
scoring_elements 0.92163
published_at 2026-04-13T12:55:00Z
8
value 0.08119
scoring_system epss
scoring_elements 0.92173
published_at 2026-04-18T12:55:00Z
9
value 0.08119
scoring_system epss
scoring_elements 0.92174
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1458
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
reference_id 668273
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668273
3
reference_url https://usn.ubuntu.com/1482-1/
reference_id USN-1482-1
reference_type
scores
url https://usn.ubuntu.com/1482-1/
fixed_packages
0
url pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@0.97.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.97.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/clamav@0.103.10%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.103.10%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1~deb12u2%3Fdistro=trixie
3
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kba-63mx-hya7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.3%252Bdfsg-2%3Fdistro=trixie
5
url pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/clamav@1.4.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@1.4.4%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1458
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbbh-2bet-gyaz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/clamav@0.97.5%252Bdfsg-1%3Fdistro=trixie