Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/sys-libs/glibc@2.25-r11
Typeebuild
Namespacesys-libs
Nameglibc
Version2.25-r11
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.26.0
Latest_non_vulnerable_version2.41-r5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cv87-rxmr-cqhn
vulnerability_id VCID-cv87-rxmr-cqhn
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15671
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45897
published_at 2026-04-21T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45852
published_at 2026-04-07T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45908
published_at 2026-04-08T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45905
published_at 2026-04-13T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45928
published_at 2026-04-11T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45898
published_at 2026-04-12T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.45957
published_at 2026-04-16T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45952
published_at 2026-04-18T12:55:00Z
8
value 0.00403
scoring_system epss
scoring_elements 0.60737
published_at 2026-04-01T12:55:00Z
9
value 0.00403
scoring_system epss
scoring_elements 0.6081
published_at 2026-04-02T12:55:00Z
10
value 0.00403
scoring_system epss
scoring_elements 0.60839
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22325
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22325
5
reference_url http://www.securityfocus.com/bid/101517
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101517
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1504806
reference_id 1504806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1504806
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500
reference_id 879500
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500
8
reference_url https://security.archlinux.org/ASA-201801-8
reference_id ASA-201801-8
reference_type
scores
url https://security.archlinux.org/ASA-201801-8
9
reference_url https://security.archlinux.org/ASA-201801-9
reference_id ASA-201801-9
reference_type
scores
url https://security.archlinux.org/ASA-201801-9
10
reference_url https://security.archlinux.org/AVG-460
reference_id AVG-460
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-460
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15671
reference_id CVE-2017-15671
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15671
13
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2017-15671
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cv87-rxmr-cqhn
1
url VCID-hdz6-ewkg-xqc9
vulnerability_id VCID-hdz6-ewkg-xqc9
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15804
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43014
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43061
published_at 2026-04-21T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43126
published_at 2026-04-11T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43077
published_at 2026-04-13T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43137
published_at 2026-04-16T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43127
published_at 2026-04-18T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43072
published_at 2026-04-02T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.431
published_at 2026-04-04T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43039
published_at 2026-04-07T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43092
published_at 2026-04-12T12:55:00Z
10
value 0.00207
scoring_system epss
scoring_elements 0.43104
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15804
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22332
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22332
5
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
6
reference_url http://www.securityfocus.com/bid/101535
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101535
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1505298
reference_id 1505298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1505298
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955
reference_id 879955
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15804
reference_id CVE-2017-15804
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15804
11
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
12
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
13
reference_url https://access.redhat.com/errata/RHSA-2018:1879
reference_id RHSA-2018:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1879
14
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2017-15804
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz6-ewkg-xqc9
2
url VCID-qaaq-fss4-1kgr
vulnerability_id VCID-qaaq-fss4-1kgr
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6485
reference_id
reference_type
scores
0
value 0.01095
scoring_system epss
scoring_elements 0.77936
published_at 2026-04-01T12:55:00Z
1
value 0.01095
scoring_system epss
scoring_elements 0.77943
published_at 2026-04-02T12:55:00Z
2
value 0.01095
scoring_system epss
scoring_elements 0.77971
published_at 2026-04-04T12:55:00Z
3
value 0.01095
scoring_system epss
scoring_elements 0.77952
published_at 2026-04-07T12:55:00Z
4
value 0.01095
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-08T12:55:00Z
5
value 0.01095
scoring_system epss
scoring_elements 0.77983
published_at 2026-04-09T12:55:00Z
6
value 0.01095
scoring_system epss
scoring_elements 0.7801
published_at 2026-04-11T12:55:00Z
7
value 0.01095
scoring_system epss
scoring_elements 0.77993
published_at 2026-04-12T12:55:00Z
8
value 0.01095
scoring_system epss
scoring_elements 0.77992
published_at 2026-04-13T12:55:00Z
9
value 0.01095
scoring_system epss
scoring_elements 0.78027
published_at 2026-04-16T12:55:00Z
10
value 0.01095
scoring_system epss
scoring_elements 0.78026
published_at 2026-04-18T12:55:00Z
11
value 0.01095
scoring_system epss
scoring_elements 0.78019
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1542102
reference_id 1542102
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1542102
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159
reference_id 878159
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159
6
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
7
reference_url https://access.redhat.com/errata/RHSA-2018:3092
reference_id RHSA-2018:3092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3092
8
reference_url https://usn.ubuntu.com/4218-1/
reference_id USN-4218-1
reference_type
scores
url https://usn.ubuntu.com/4218-1/
9
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2018-6485
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qaaq-fss4-1kgr
3
url VCID-qwx5-bayb-bkcg
vulnerability_id VCID-qwx5-bayb-bkcg
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6551
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.61605
published_at 2026-04-01T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61679
published_at 2026-04-02T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.6171
published_at 2026-04-04T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61681
published_at 2026-04-07T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-08T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.61745
published_at 2026-04-09T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61767
published_at 2026-04-11T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61754
published_at 2026-04-12T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61735
published_at 2026-04-13T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61776
published_at 2026-04-16T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.61782
published_at 2026-04-18T12:55:00Z
11
value 0.00416
scoring_system epss
scoring_elements 0.61764
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1542119
reference_id 1542119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1542119
4
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2018-6551
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwx5-bayb-bkcg
4
url VCID-t8vj-uhuz-kybt
vulnerability_id VCID-t8vj-uhuz-kybt
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14062.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14062
reference_id
reference_type
scores
0
value 0.01215
scoring_system epss
scoring_elements 0.7898
published_at 2026-04-01T12:55:00Z
1
value 0.01215
scoring_system epss
scoring_elements 0.7905
published_at 2026-04-21T12:55:00Z
2
value 0.01215
scoring_system epss
scoring_elements 0.79026
published_at 2026-04-13T12:55:00Z
3
value 0.01215
scoring_system epss
scoring_elements 0.79055
published_at 2026-04-16T12:55:00Z
4
value 0.01215
scoring_system epss
scoring_elements 0.78986
published_at 2026-04-02T12:55:00Z
5
value 0.01215
scoring_system epss
scoring_elements 0.79013
published_at 2026-04-04T12:55:00Z
6
value 0.01215
scoring_system epss
scoring_elements 0.78997
published_at 2026-04-07T12:55:00Z
7
value 0.01215
scoring_system epss
scoring_elements 0.79021
published_at 2026-04-08T12:55:00Z
8
value 0.01215
scoring_system epss
scoring_elements 0.79028
published_at 2026-04-09T12:55:00Z
9
value 0.01215
scoring_system epss
scoring_elements 0.79052
published_at 2026-04-18T12:55:00Z
10
value 0.01215
scoring_system epss
scoring_elements 0.79037
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14062
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1486882
reference_id 1486882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1486882
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873903
reference_id 873903
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873903
6
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
7
reference_url https://usn.ubuntu.com/3421-1/
reference_id USN-3421-1
reference_type
scores
url https://usn.ubuntu.com/3421-1/
8
reference_url https://usn.ubuntu.com/3434-1/
reference_id USN-3434-1
reference_type
scores
url https://usn.ubuntu.com/3434-1/
9
reference_url https://usn.ubuntu.com/3434-2/
reference_id USN-3434-2
reference_type
scores
url https://usn.ubuntu.com/3434-2/
10
reference_url https://usn.ubuntu.com/USN-3421-2/
reference_id USN-USN-3421-2
reference_type
scores
url https://usn.ubuntu.com/USN-3421-2/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2017-14062
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8vj-uhuz-kybt
5
url VCID-wctr-ebf2-gqa1
vulnerability_id VCID-wctr-ebf2-gqa1
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15670
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44273
published_at 2026-04-01T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.4432
published_at 2026-04-21T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44359
published_at 2026-04-09T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44376
published_at 2026-04-11T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44345
published_at 2026-04-12T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.444
published_at 2026-04-16T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4439
published_at 2026-04-18T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44344
published_at 2026-04-13T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44366
published_at 2026-04-04T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44302
published_at 2026-04-07T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44354
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22320
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22320
5
reference_url http://www.securityfocus.com/bid/101521
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101521
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1504804
reference_id 1504804
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1504804
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501
reference_id 879501
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501
8
reference_url https://security.archlinux.org/ASA-201801-8
reference_id ASA-201801-8
reference_type
scores
url https://security.archlinux.org/ASA-201801-8
9
reference_url https://security.archlinux.org/ASA-201801-9
reference_id ASA-201801-9
reference_type
scores
url https://security.archlinux.org/ASA-201801-9
10
reference_url https://security.archlinux.org/AVG-460
reference_id AVG-460
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-460
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15670
reference_id CVE-2017-15670
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15670
13
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
14
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
15
reference_url https://access.redhat.com/errata/RHSA-2018:1879
reference_id RHSA-2018:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1879
16
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2017-15670
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wctr-ebf2-gqa1
6
url VCID-wp12-z5a5-pbgd
vulnerability_id VCID-wp12-z5a5-pbgd
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16997
reference_id
reference_type
scores
0
value 0.00878
scoring_system epss
scoring_elements 0.75266
published_at 2026-04-01T12:55:00Z
1
value 0.00878
scoring_system epss
scoring_elements 0.75358
published_at 2026-04-21T12:55:00Z
2
value 0.00878
scoring_system epss
scoring_elements 0.75333
published_at 2026-04-12T12:55:00Z
3
value 0.00878
scoring_system epss
scoring_elements 0.75322
published_at 2026-04-13T12:55:00Z
4
value 0.00878
scoring_system epss
scoring_elements 0.75362
published_at 2026-04-16T12:55:00Z
5
value 0.00878
scoring_system epss
scoring_elements 0.75368
published_at 2026-04-18T12:55:00Z
6
value 0.00878
scoring_system epss
scoring_elements 0.7527
published_at 2026-04-02T12:55:00Z
7
value 0.00878
scoring_system epss
scoring_elements 0.75302
published_at 2026-04-04T12:55:00Z
8
value 0.00878
scoring_system epss
scoring_elements 0.7528
published_at 2026-04-07T12:55:00Z
9
value 0.00878
scoring_system epss
scoring_elements 0.75323
published_at 2026-04-08T12:55:00Z
10
value 0.00878
scoring_system epss
scoring_elements 0.75334
published_at 2026-04-09T12:55:00Z
11
value 0.00878
scoring_system epss
scoring_elements 0.75355
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16997
3
reference_url https://bugs.debian.org/884615
reference_id
reference_type
scores
url https://bugs.debian.org/884615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22625
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22625
7
reference_url https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
reference_id
reference_type
scores
url https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
8
reference_url http://www.securityfocus.com/bid/102228
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102228
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1526865
reference_id 1526865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1526865
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615
reference_id 884615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16997
reference_id CVE-2017-16997
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16997
22
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
23
reference_url https://access.redhat.com/errata/RHSA-2018:3092
reference_id RHSA-2018:3092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3092
24
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2017-16997
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wp12-z5a5-pbgd
7
url VCID-ww2m-6691-yfa7
vulnerability_id VCID-ww2m-6691-yfa7
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000001
reference_id
reference_type
scores
0
value 0.41417
scoring_system epss
scoring_elements 0.97411
published_at 2026-04-21T12:55:00Z
1
value 0.41417
scoring_system epss
scoring_elements 0.974
published_at 2026-04-12T12:55:00Z
2
value 0.41417
scoring_system epss
scoring_elements 0.97401
published_at 2026-04-13T12:55:00Z
3
value 0.41417
scoring_system epss
scoring_elements 0.97409
published_at 2026-04-16T12:55:00Z
4
value 0.41417
scoring_system epss
scoring_elements 0.97412
published_at 2026-04-18T12:55:00Z
5
value 0.41417
scoring_system epss
scoring_elements 0.9739
published_at 2026-04-07T12:55:00Z
6
value 0.41417
scoring_system epss
scoring_elements 0.97396
published_at 2026-04-08T12:55:00Z
7
value 0.41417
scoring_system epss
scoring_elements 0.97397
published_at 2026-04-09T12:55:00Z
8
value 0.41417
scoring_system epss
scoring_elements 0.97399
published_at 2026-04-11T12:55:00Z
9
value 0.44049
scoring_system epss
scoring_elements 0.97524
published_at 2026-04-02T12:55:00Z
10
value 0.44049
scoring_system epss
scoring_elements 0.97527
published_at 2026-04-04T12:55:00Z
11
value 0.44049
scoring_system epss
scoring_elements 0.97518
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1533836
reference_id 1533836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1533836
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001
reference_id 887001
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001
5
reference_url https://security.archlinux.org/ASA-201801-18
reference_id ASA-201801-18
reference_type
scores
url https://security.archlinux.org/ASA-201801-18
6
reference_url https://security.archlinux.org/ASA-201801-19
reference_id ASA-201801-19
reference_type
scores
url https://security.archlinux.org/ASA-201801-19
7
reference_url https://security.archlinux.org/AVG-590
reference_id AVG-590
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-590
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb
10
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb
11
reference_url https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
12
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
13
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
14
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
15
reference_url https://usn.ubuntu.com/3536-1/
reference_id USN-3536-1
reference_type
scores
url https://usn.ubuntu.com/3536-1/
16
reference_url https://usn.ubuntu.com/USN-4768-1/
reference_id USN-USN-4768-1
reference_type
scores
url https://usn.ubuntu.com/USN-4768-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.25-r11
purl pkg:ebuild/sys-libs/glibc@2.25-r11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11
aliases CVE-2018-1000001
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ww2m-6691-yfa7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.25-r11