Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/sys-libs/glibc@2.19-r1
Typeebuild
Namespacesys-libs
Nameglibc
Version2.19-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.21-r2
Latest_non_vulnerable_version2.41-r5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1971-5hzf-43dt
vulnerability_id VCID-1971-5hzf-43dt
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
1
reference_url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
2
reference_url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4043
reference_id
reference_type
scores
0
value 0.01643
scoring_system epss
scoring_elements 0.81993
published_at 2026-04-21T12:55:00Z
1
value 0.01643
scoring_system epss
scoring_elements 0.81888
published_at 2026-04-01T12:55:00Z
2
value 0.01643
scoring_system epss
scoring_elements 0.81899
published_at 2026-04-02T12:55:00Z
3
value 0.01643
scoring_system epss
scoring_elements 0.81922
published_at 2026-04-04T12:55:00Z
4
value 0.01643
scoring_system epss
scoring_elements 0.81918
published_at 2026-04-07T12:55:00Z
5
value 0.01643
scoring_system epss
scoring_elements 0.81945
published_at 2026-04-08T12:55:00Z
6
value 0.01643
scoring_system epss
scoring_elements 0.81952
published_at 2026-04-09T12:55:00Z
7
value 0.01643
scoring_system epss
scoring_elements 0.81972
published_at 2026-04-11T12:55:00Z
8
value 0.01643
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-12T12:55:00Z
9
value 0.01643
scoring_system epss
scoring_elements 0.81956
published_at 2026-04-13T12:55:00Z
10
value 0.01643
scoring_system epss
scoring_elements 0.81991
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
11
reference_url http://seclists.org/fulldisclosure/2019/Jun/18
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jun/18
12
reference_url http://seclists.org/fulldisclosure/2019/Sep/7
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Sep/7
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
14
reference_url https://seclists.org/bugtraq/2019/Jun/14
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jun/14
15
reference_url https://seclists.org/bugtraq/2019/Sep/7
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/7
16
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17048
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17048
17
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
18
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
19
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
21
reference_url http://www.securityfocus.com/bid/68006
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68006
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1109263
reference_id 1109263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1109263
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774
reference_id 751774
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4043
reference_id CVE-2014-4043
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4043
27
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
28
reference_url https://usn.ubuntu.com/2306-1/
reference_id USN-2306-1
reference_type
scores
url https://usn.ubuntu.com/2306-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2014-4043
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt
1
url VCID-22vv-9xn4-vyap
vulnerability_id VCID-22vv-9xn4-vyap
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3404
reference_id
reference_type
scores
0
value 0.00604
scoring_system epss
scoring_elements 0.6952
published_at 2026-04-01T12:55:00Z
1
value 0.00604
scoring_system epss
scoring_elements 0.69531
published_at 2026-04-02T12:55:00Z
2
value 0.00604
scoring_system epss
scoring_elements 0.69546
published_at 2026-04-04T12:55:00Z
3
value 0.00604
scoring_system epss
scoring_elements 0.69525
published_at 2026-04-07T12:55:00Z
4
value 0.00604
scoring_system epss
scoring_elements 0.69575
published_at 2026-04-08T12:55:00Z
5
value 0.00604
scoring_system epss
scoring_elements 0.69592
published_at 2026-04-09T12:55:00Z
6
value 0.00604
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-21T12:55:00Z
7
value 0.00604
scoring_system epss
scoring_elements 0.69599
published_at 2026-04-12T12:55:00Z
8
value 0.00604
scoring_system epss
scoring_elements 0.69585
published_at 2026-04-13T12:55:00Z
9
value 0.00604
scoring_system epss
scoring_elements 0.69624
published_at 2026-04-16T12:55:00Z
10
value 0.00604
scoring_system epss
scoring_elements 0.69633
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
reference_id 681473
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=833703
reference_id 833703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=833703
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2012:1098
reference_id RHSA-2012:1098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1098
7
reference_url https://access.redhat.com/errata/RHSA-2012:1200
reference_id RHSA-2012:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1200
8
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2012-3404
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22vv-9xn4-vyap
2
url VCID-42jj-9jmf-s3h5
vulnerability_id VCID-42jj-9jmf-s3h5
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4424
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.6964
published_at 2026-04-01T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69652
published_at 2026-04-02T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69668
published_at 2026-04-04T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69645
published_at 2026-04-07T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-08T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.69713
published_at 2026-04-09T12:55:00Z
6
value 0.00608
scoring_system epss
scoring_elements 0.69735
published_at 2026-04-11T12:55:00Z
7
value 0.00608
scoring_system epss
scoring_elements 0.6972
published_at 2026-04-12T12:55:00Z
8
value 0.00608
scoring_system epss
scoring_elements 0.69707
published_at 2026-04-13T12:55:00Z
9
value 0.00608
scoring_system epss
scoring_elements 0.69747
published_at 2026-04-16T12:55:00Z
10
value 0.00608
scoring_system epss
scoring_elements 0.69756
published_at 2026-04-18T12:55:00Z
11
value 0.00608
scoring_system epss
scoring_elements 0.69737
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423
reference_id 689423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=858238
reference_id 858238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=858238
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2012-4424
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42jj-9jmf-s3h5
3
url VCID-byqx-z785-6qcq
vulnerability_id VCID-byqx-z785-6qcq
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4412
reference_id
reference_type
scores
0
value 0.18703
scoring_system epss
scoring_elements 0.95243
published_at 2026-04-01T12:55:00Z
1
value 0.18703
scoring_system epss
scoring_elements 0.95255
published_at 2026-04-02T12:55:00Z
2
value 0.18703
scoring_system epss
scoring_elements 0.95258
published_at 2026-04-04T12:55:00Z
3
value 0.18703
scoring_system epss
scoring_elements 0.95262
published_at 2026-04-07T12:55:00Z
4
value 0.18703
scoring_system epss
scoring_elements 0.9527
published_at 2026-04-08T12:55:00Z
5
value 0.18703
scoring_system epss
scoring_elements 0.95272
published_at 2026-04-09T12:55:00Z
6
value 0.18703
scoring_system epss
scoring_elements 0.95277
published_at 2026-04-11T12:55:00Z
7
value 0.18703
scoring_system epss
scoring_elements 0.95278
published_at 2026-04-12T12:55:00Z
8
value 0.18703
scoring_system epss
scoring_elements 0.95281
published_at 2026-04-13T12:55:00Z
9
value 0.18703
scoring_system epss
scoring_elements 0.95289
published_at 2026-04-16T12:55:00Z
10
value 0.18703
scoring_system epss
scoring_elements 0.95293
published_at 2026-04-18T12:55:00Z
11
value 0.18703
scoring_system epss
scoring_elements 0.95296
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530
reference_id 687530
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=855385
reference_id 855385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=855385
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c
reference_id CVE-2012-4412;OSVDB-98142
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c
6
reference_url https://www.securityfocus.com/bid/55462/info
reference_id CVE-2012-4412;OSVDB-98142
reference_type exploit
scores
url https://www.securityfocus.com/bid/55462/info
7
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
8
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2012-4412
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byqx-z785-6qcq
4
url VCID-e9fg-s2r5-qfc2
vulnerability_id VCID-e9fg-s2r5-qfc2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6656
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79001
published_at 2026-04-21T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-01T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78936
published_at 2026-04-02T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78964
published_at 2026-04-04T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-07T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-08T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.78978
published_at 2026-04-09T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-18T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78987
published_at 2026-04-12T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-13T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6656
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=14134
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=14134
7
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5
reference_id
reference_type
scores
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5
8
reference_url http://www.debian.org/security/2015/dsa-3142
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3142
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
10
reference_url http://www.openwall.com/lists/oss-security/2014/08/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/08/29/3
11
reference_url http://www.openwall.com/lists/oss-security/2014/09/02/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/02/1
12
reference_url http://www.securityfocus.com/bid/69472
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69472
13
reference_url http://www.ubuntu.com/usn/USN-2432-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2432-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135840
reference_id 1135840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135840
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6656
reference_id CVE-2012-6656
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6656
22
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
23
reference_url https://usn.ubuntu.com/2432-1/
reference_id USN-2432-1
reference_type
scores
url https://usn.ubuntu.com/2432-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2012-6656
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2
5
url VCID-hkyd-8rrg-v3e7
vulnerability_id VCID-hkyd-8rrg-v3e7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3406
reference_id
reference_type
scores
0
value 0.00869
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-01T12:55:00Z
1
value 0.00869
scoring_system epss
scoring_elements 0.75135
published_at 2026-04-02T12:55:00Z
2
value 0.00869
scoring_system epss
scoring_elements 0.75165
published_at 2026-04-04T12:55:00Z
3
value 0.00869
scoring_system epss
scoring_elements 0.75142
published_at 2026-04-07T12:55:00Z
4
value 0.00869
scoring_system epss
scoring_elements 0.75176
published_at 2026-04-13T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-09T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75209
published_at 2026-04-11T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75187
published_at 2026-04-12T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.75213
published_at 2026-04-16T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75219
published_at 2026-04-18T12:55:00Z
10
value 0.00869
scoring_system epss
scoring_elements 0.75208
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3406
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888
reference_id 681888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=826943
reference_id 826943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=826943
10
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
11
reference_url https://access.redhat.com/errata/RHSA-2012:1097
reference_id RHSA-2012:1097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1097
12
reference_url https://access.redhat.com/errata/RHSA-2012:1098
reference_id RHSA-2012:1098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1098
13
reference_url https://access.redhat.com/errata/RHSA-2012:1200
reference_id RHSA-2012:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1200
14
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2012-3406
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7
6
url VCID-kpcn-f4dw-97hm
vulnerability_id VCID-kpcn-f4dw-97hm
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2207
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21653
published_at 2026-04-21T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21822
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21627
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21703
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.2176
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21771
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21732
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21675
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21683
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544
reference_id 717544
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976408
reference_id 976408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976408
6
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
7
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2013-2207
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm
7
url VCID-mt93-6b2q-1faf
vulnerability_id VCID-mt93-6b2q-1faf
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0235
reference_id
reference_type
scores
0
value 0.8487
scoring_system epss
scoring_elements 0.99349
published_at 2026-04-21T12:55:00Z
1
value 0.8487
scoring_system epss
scoring_elements 0.99347
published_at 2026-04-13T12:55:00Z
2
value 0.8487
scoring_system epss
scoring_elements 0.9935
published_at 2026-04-18T12:55:00Z
3
value 0.86662
scoring_system epss
scoring_elements 0.9942
published_at 2026-04-11T12:55:00Z
4
value 0.86662
scoring_system epss
scoring_elements 0.99416
published_at 2026-04-01T12:55:00Z
5
value 0.86662
scoring_system epss
scoring_elements 0.99415
published_at 2026-04-02T12:55:00Z
6
value 0.86662
scoring_system epss
scoring_elements 0.99417
published_at 2026-04-04T12:55:00Z
7
value 0.86966
scoring_system epss
scoring_elements 0.99432
published_at 2026-04-09T12:55:00Z
8
value 0.86966
scoring_system epss
scoring_elements 0.99431
published_at 2026-04-08T12:55:00Z
9
value 0.86966
scoring_system epss
scoring_elements 0.9943
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1183461
reference_id 1183461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1183461
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py
reference_id CVE-2015-0235;OSVDB-117579
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb
reference_id CVE-2015-0235;OSVDB-117579
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb
9
reference_url https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
reference_id CVE-2015-0235;OSVDB-117579
reference_type exploit
scores
url https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
10
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
11
reference_url https://access.redhat.com/errata/RHSA-2015:0090
reference_id RHSA-2015:0090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0090
12
reference_url https://access.redhat.com/errata/RHSA-2015:0092
reference_id RHSA-2015:0092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0092
13
reference_url https://access.redhat.com/errata/RHSA-2015:0099
reference_id RHSA-2015:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0099
14
reference_url https://access.redhat.com/errata/RHSA-2015:0101
reference_id RHSA-2015:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0101
15
reference_url https://access.redhat.com/errata/RHSA-2015:0126
reference_id RHSA-2015:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0126
16
reference_url https://usn.ubuntu.com/2485-1/
reference_id USN-2485-1
reference_type
scores
url https://usn.ubuntu.com/2485-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2015-0235
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf
8
url VCID-nrvz-y7zn-6bgu
vulnerability_id VCID-nrvz-y7zn-6bgu
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4788
reference_id
reference_type
scores
0
value 0.0756
scoring_system epss
scoring_elements 0.9179
published_at 2026-04-01T12:55:00Z
1
value 0.0756
scoring_system epss
scoring_elements 0.91799
published_at 2026-04-02T12:55:00Z
2
value 0.0756
scoring_system epss
scoring_elements 0.91804
published_at 2026-04-04T12:55:00Z
3
value 0.0756
scoring_system epss
scoring_elements 0.91813
published_at 2026-04-07T12:55:00Z
4
value 0.0756
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-08T12:55:00Z
5
value 0.0756
scoring_system epss
scoring_elements 0.91832
published_at 2026-04-09T12:55:00Z
6
value 0.0756
scoring_system epss
scoring_elements 0.91835
published_at 2026-04-11T12:55:00Z
7
value 0.0756
scoring_system epss
scoring_elements 0.91837
published_at 2026-04-12T12:55:00Z
8
value 0.0756
scoring_system epss
scoring_elements 0.91833
published_at 2026-04-13T12:55:00Z
9
value 0.0756
scoring_system epss
scoring_elements 0.91853
published_at 2026-04-16T12:55:00Z
10
value 0.0756
scoring_system epss
scoring_elements 0.9185
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178
reference_id 717178
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=985625
reference_id 985625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=985625
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c
reference_id CVE-2013-4788;OSVDB-95392
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c
6
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2013-4788
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrvz-y7zn-6bgu
9
url VCID-rp43-q42n-jkh5
vulnerability_id VCID-rp43-q42n-jkh5
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html
1
reference_url http://osvdb.org/84710
reference_id
reference_type
scores
url http://osvdb.org/84710
2
reference_url http://rhn.redhat.com/errata/RHSA-2012-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1207.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2012-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1208.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1262.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1262.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2012-1325.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1325.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3480
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42316
published_at 2026-04-21T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42307
published_at 2026-04-01T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42381
published_at 2026-04-02T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42411
published_at 2026-04-04T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.4235
published_at 2026-04-07T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42399
published_at 2026-04-08T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42407
published_at 2026-04-09T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42429
published_at 2026-04-11T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42393
published_at 2026-04-12T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42364
published_at 2026-04-13T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42413
published_at 2026-04-16T12:55:00Z
11
value 0.00203
scoring_system epss
scoring_elements 0.42388
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3480
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480
9
reference_url http://secunia.com/advisories/50201
reference_id
reference_type
scores
url http://secunia.com/advisories/50201
10
reference_url http://secunia.com/advisories/50422
reference_id
reference_type
scores
url http://secunia.com/advisories/50422
11
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=14459
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=14459
12
reference_url http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html
reference_id
reference_type
scores
url http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html
13
reference_url http://www.openwall.com/lists/oss-security/2012/08/13/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/08/13/4
14
reference_url http://www.openwall.com/lists/oss-security/2012/08/13/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/08/13/6
15
reference_url http://www.securityfocus.com/bid/54982
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54982
16
reference_url http://www.securitytracker.com/id?1027374
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027374
17
reference_url http://www.ubuntu.com/usn/USN-1589-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1589-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=847715
reference_id 847715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=847715
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3480
reference_id CVE-2012-3480
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3480
21
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c
reference_id CVE-2012-3480;OSVDB-84710
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c
22
reference_url https://www.securityfocus.com/bid/54982/info
reference_id CVE-2012-3480;OSVDB-84710
reference_type exploit
scores
url https://www.securityfocus.com/bid/54982/info
23
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
24
reference_url https://access.redhat.com/errata/RHSA-2012:1207
reference_id RHSA-2012:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1207
25
reference_url https://access.redhat.com/errata/RHSA-2012:1208
reference_id RHSA-2012:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1208
26
reference_url https://access.redhat.com/errata/RHSA-2012:1325
reference_id RHSA-2012:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1325
27
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
28
reference_url https://usn.ubuntu.com/1589-2/
reference_id USN-1589-2
reference_type
scores
url https://usn.ubuntu.com/1589-2/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2012-3480
risk_score 8.2
exploitability 2.0
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rp43-q42n-jkh5
10
url VCID-skgp-p9xp-k3cf
vulnerability_id VCID-skgp-p9xp-k3cf
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3405
reference_id
reference_type
scores
0
value 0.00666
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-01T12:55:00Z
1
value 0.00666
scoring_system epss
scoring_elements 0.712
published_at 2026-04-02T12:55:00Z
2
value 0.00666
scoring_system epss
scoring_elements 0.71218
published_at 2026-04-04T12:55:00Z
3
value 0.00666
scoring_system epss
scoring_elements 0.71192
published_at 2026-04-07T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71234
published_at 2026-04-08T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-09T12:55:00Z
6
value 0.00666
scoring_system epss
scoring_elements 0.71271
published_at 2026-04-11T12:55:00Z
7
value 0.00666
scoring_system epss
scoring_elements 0.71256
published_at 2026-04-12T12:55:00Z
8
value 0.00666
scoring_system epss
scoring_elements 0.7124
published_at 2026-04-13T12:55:00Z
9
value 0.00666
scoring_system epss
scoring_elements 0.71287
published_at 2026-04-16T12:55:00Z
10
value 0.00666
scoring_system epss
scoring_elements 0.71293
published_at 2026-04-18T12:55:00Z
11
value 0.00666
scoring_system epss
scoring_elements 0.7127
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3405
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
reference_id 681473
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=833704
reference_id 833704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=833704
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2012:1098
reference_id RHSA-2012:1098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1098
7
reference_url https://access.redhat.com/errata/RHSA-2012:1200
reference_id RHSA-2012:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1200
8
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2012-3405
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skgp-p9xp-k3cf
11
url VCID-tdxd-r347-3yex
vulnerability_id VCID-tdxd-r347-3yex
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0769.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0769.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1605.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1605.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1914
reference_id
reference_type
scores
0
value 0.03104
scoring_system epss
scoring_elements 0.8683
published_at 2026-04-21T12:55:00Z
1
value 0.03104
scoring_system epss
scoring_elements 0.86827
published_at 2026-04-16T12:55:00Z
2
value 0.03104
scoring_system epss
scoring_elements 0.86831
published_at 2026-04-18T12:55:00Z
3
value 0.03398
scoring_system epss
scoring_elements 0.87403
published_at 2026-04-08T12:55:00Z
4
value 0.03398
scoring_system epss
scoring_elements 0.8741
published_at 2026-04-09T12:55:00Z
5
value 0.03398
scoring_system epss
scoring_elements 0.87359
published_at 2026-04-01T12:55:00Z
6
value 0.03398
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-12T12:55:00Z
7
value 0.03398
scoring_system epss
scoring_elements 0.87413
published_at 2026-04-13T12:55:00Z
8
value 0.03398
scoring_system epss
scoring_elements 0.87422
published_at 2026-04-11T12:55:00Z
9
value 0.03398
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-02T12:55:00Z
10
value 0.03398
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1914
5
reference_url https://bugzilla.novell.com/show_bug.cgi?id=813121
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=813121
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
7
reference_url http://seclists.org/fulldisclosure/2021/Sep/0
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2021/Sep/0
8
reference_url http://secunia.com/advisories/52817
reference_id
reference_type
scores
url http://secunia.com/advisories/52817
9
reference_url http://secunia.com/advisories/55113
reference_id
reference_type
scores
url http://secunia.com/advisories/55113
10
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=15330
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=15330
11
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
15
reference_url http://www.openwall.com/lists/oss-security/2013/04/03/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/03/2
16
reference_url http://www.openwall.com/lists/oss-security/2013/04/03/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/03/8
17
reference_url http://www.openwall.com/lists/oss-security/2013/04/05/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/05/1
18
reference_url http://www.securityfocus.com/bid/58839
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58839
19
reference_url http://www.ubuntu.com/usn/USN-1991-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1991-1
20
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623
reference_id 704623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=947882
reference_id 947882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=947882
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1914
reference_id CVE-2013-1914
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1914
60
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
61
reference_url https://access.redhat.com/errata/RHSA-2013:0769
reference_id RHSA-2013:0769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0769
62
reference_url https://access.redhat.com/errata/RHSA-2013:1605
reference_id RHSA-2013:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1605
63
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2013-1914
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex
12
url VCID-w1zk-1c5m-3fb2
vulnerability_id VCID-w1zk-1c5m-3fb2
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4458
reference_id
reference_type
scores
0
value 0.01201
scoring_system epss
scoring_elements 0.78873
published_at 2026-04-01T12:55:00Z
1
value 0.01201
scoring_system epss
scoring_elements 0.78879
published_at 2026-04-02T12:55:00Z
2
value 0.01201
scoring_system epss
scoring_elements 0.78908
published_at 2026-04-04T12:55:00Z
3
value 0.01201
scoring_system epss
scoring_elements 0.78889
published_at 2026-04-07T12:55:00Z
4
value 0.01201
scoring_system epss
scoring_elements 0.78914
published_at 2026-04-08T12:55:00Z
5
value 0.01201
scoring_system epss
scoring_elements 0.7892
published_at 2026-04-13T12:55:00Z
6
value 0.01201
scoring_system epss
scoring_elements 0.78944
published_at 2026-04-21T12:55:00Z
7
value 0.01201
scoring_system epss
scoring_elements 0.78929
published_at 2026-04-12T12:55:00Z
8
value 0.01201
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-16T12:55:00Z
9
value 0.01201
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1022280
reference_id 1022280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1022280
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181
reference_id 727181
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2014:1391
reference_id RHSA-2014:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1391
7
reference_url https://usn.ubuntu.com/2306-1/
reference_id USN-2306-1
reference_type
scores
url https://usn.ubuntu.com/2306-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2013-4458
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1zk-1c5m-3fb2
13
url VCID-ydrg-f673-53gv
vulnerability_id VCID-ydrg-f673-53gv
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4332
reference_id
reference_type
scores
0
value 0.01645
scoring_system epss
scoring_elements 0.81904
published_at 2026-04-01T12:55:00Z
1
value 0.01645
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-02T12:55:00Z
2
value 0.01645
scoring_system epss
scoring_elements 0.81938
published_at 2026-04-04T12:55:00Z
3
value 0.01645
scoring_system epss
scoring_elements 0.81934
published_at 2026-04-07T12:55:00Z
4
value 0.01645
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-08T12:55:00Z
5
value 0.01645
scoring_system epss
scoring_elements 0.81968
published_at 2026-04-09T12:55:00Z
6
value 0.01645
scoring_system epss
scoring_elements 0.81988
published_at 2026-04-11T12:55:00Z
7
value 0.01645
scoring_system epss
scoring_elements 0.81976
published_at 2026-04-12T12:55:00Z
8
value 0.01645
scoring_system epss
scoring_elements 0.81971
published_at 2026-04-13T12:55:00Z
9
value 0.01645
scoring_system epss
scoring_elements 0.82007
published_at 2026-04-18T12:55:00Z
10
value 0.01645
scoring_system epss
scoring_elements 0.82009
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1007545
reference_id 1007545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1007545
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536
reference_id 722536
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2013:1411
reference_id RHSA-2013:1411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1411
7
reference_url https://access.redhat.com/errata/RHSA-2013:1605
reference_id RHSA-2013:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1605
8
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2013-4332
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrg-f673-53gv
14
url VCID-yh8v-ebxn-z7dp
vulnerability_id VCID-yh8v-ebxn-z7dp
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4237
reference_id
reference_type
scores
0
value 0.01052
scoring_system epss
scoring_elements 0.77497
published_at 2026-04-01T12:55:00Z
1
value 0.01052
scoring_system epss
scoring_elements 0.77503
published_at 2026-04-02T12:55:00Z
2
value 0.01052
scoring_system epss
scoring_elements 0.77528
published_at 2026-04-04T12:55:00Z
3
value 0.01052
scoring_system epss
scoring_elements 0.77508
published_at 2026-04-07T12:55:00Z
4
value 0.01052
scoring_system epss
scoring_elements 0.77538
published_at 2026-04-08T12:55:00Z
5
value 0.01052
scoring_system epss
scoring_elements 0.77547
published_at 2026-04-09T12:55:00Z
6
value 0.01052
scoring_system epss
scoring_elements 0.77573
published_at 2026-04-11T12:55:00Z
7
value 0.01052
scoring_system epss
scoring_elements 0.77558
published_at 2026-04-12T12:55:00Z
8
value 0.01052
scoring_system epss
scoring_elements 0.77556
published_at 2026-04-13T12:55:00Z
9
value 0.01052
scoring_system epss
scoring_elements 0.77594
published_at 2026-04-16T12:55:00Z
10
value 0.01052
scoring_system epss
scoring_elements 0.77592
published_at 2026-04-18T12:55:00Z
11
value 0.01052
scoring_system epss
scoring_elements 0.77586
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4237
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558
reference_id 719558
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=995839
reference_id 995839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=995839
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2014:1391
reference_id RHSA-2014:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1391
7
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2013-4237
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yh8v-ebxn-z7dp
15
url VCID-za5g-uj5p-5kd4
vulnerability_id VCID-za5g-uj5p-5kd4
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url http://osvdb.org/89747
reference_id
reference_type
scores
url http://osvdb.org/89747
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0769.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0769.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1605.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1605.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0242
reference_id
reference_type
scores
0
value 0.02113
scoring_system epss
scoring_elements 0.8414
published_at 2026-04-21T12:55:00Z
1
value 0.02113
scoring_system epss
scoring_elements 0.84044
published_at 2026-04-01T12:55:00Z
2
value 0.02113
scoring_system epss
scoring_elements 0.84057
published_at 2026-04-02T12:55:00Z
3
value 0.02113
scoring_system epss
scoring_elements 0.84073
published_at 2026-04-04T12:55:00Z
4
value 0.02113
scoring_system epss
scoring_elements 0.84075
published_at 2026-04-07T12:55:00Z
5
value 0.02113
scoring_system epss
scoring_elements 0.84098
published_at 2026-04-08T12:55:00Z
6
value 0.02113
scoring_system epss
scoring_elements 0.84105
published_at 2026-04-09T12:55:00Z
7
value 0.02113
scoring_system epss
scoring_elements 0.84122
published_at 2026-04-11T12:55:00Z
8
value 0.02113
scoring_system epss
scoring_elements 0.84116
published_at 2026-04-12T12:55:00Z
9
value 0.02113
scoring_system epss
scoring_elements 0.84112
published_at 2026-04-13T12:55:00Z
10
value 0.02113
scoring_system epss
scoring_elements 0.84134
published_at 2026-04-16T12:55:00Z
11
value 0.02113
scoring_system epss
scoring_elements 0.84136
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0242
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
6
reference_url http://secunia.com/advisories/51951
reference_id
reference_type
scores
url http://secunia.com/advisories/51951
7
reference_url http://secunia.com/advisories/55113
reference_id
reference_type
scores
url http://secunia.com/advisories/55113
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/81707
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/81707
9
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=15078
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=15078
10
reference_url http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html
reference_id
reference_type
scores
url http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
12
reference_url http://www.openwall.com/lists/oss-security/2013/01/30/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/01/30/5
13
reference_url http://www.securityfocus.com/bid/57638
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57638
14
reference_url http://www.securitytracker.com/id/1028063
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028063
15
reference_url http://www.ubuntu.com/usn/USN-1991-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1991-1
16
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399
reference_id 699399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=905874
reference_id 905874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=905874
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0242
reference_id CVE-2013-0242
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0242
21
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
22
reference_url https://access.redhat.com/errata/RHSA-2013:0769
reference_id RHSA-2013:0769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0769
23
reference_url https://access.redhat.com/errata/RHSA-2013:1605
reference_id RHSA-2013:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1605
24
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.19-r1
purl pkg:ebuild/sys-libs/glibc@2.19-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1
aliases CVE-2013-0242
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1