Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85727?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "type": "ebuild", "namespace": "sys-libs", "name": "glibc", "version": "2.19-r1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.21-r2", "latest_non_vulnerable_version": "2.41-r5", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54361?format=api", "vulnerability_id": "VCID-1971-5hzf-43dt", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html" }, { "reference_url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html" }, { "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81993", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81888", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81952", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81972", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81991", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jun/18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jun/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Sep/7" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93784", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93784" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jun/14" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/7" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17048" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152" }, { "reference_url": "http://www.securityfocus.com/bid/68006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68006" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109263", "reference_id": "1109263", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109263" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774", "reference_id": "751774", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4043", "reference_id": "CVE-2014-4043", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4043" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/2306-1/", "reference_id": "USN-2306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2306-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2014-4043" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61763?format=api", "vulnerability_id": "VCID-22vv-9xn4-vyap", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3404", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.6952", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69575", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69614", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69599", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69624", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00604", "scoring_system": "epss", "scoring_elements": "0.69633", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473", "reference_id": "681473", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=833703", "reference_id": "833703", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833703" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098", "reference_id": "RHSA-2012:1098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200", "reference_id": "RHSA-2012:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1200" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2012-3404" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vv-9xn4-vyap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61767?format=api", "vulnerability_id": "VCID-42jj-9jmf-s3h5", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.6964", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69652", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69696", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69713", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.6972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69707", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69747", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69756", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69737", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423", "reference_id": "689423", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=858238", "reference_id": "858238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858238" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2012-4424" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42jj-9jmf-s3h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61766?format=api", "vulnerability_id": "VCID-byqx-z785-6qcq", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95255", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95262", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.9527", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95272", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95277", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95281", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95289", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95293", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.18703", "scoring_system": "epss", "scoring_elements": "0.95296", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530", "reference_id": "687530", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=855385", "reference_id": "855385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855385" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c", "reference_id": "CVE-2012-4412;OSVDB-98142", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c" }, { "reference_url": "https://www.securityfocus.com/bid/55462/info", "reference_id": "CVE-2012-4412;OSVDB-98142", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/55462/info" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2012-4412" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byqx-z785-6qcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54412?format=api", "vulnerability_id": "VCID-e9fg-s2r5-qfc2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.79001", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.7893", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78964", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78978", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.79002", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.78976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01208", "scoring_system": "epss", "scoring_elements": "0.79004", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14134" }, { "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3142" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/29/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/08/29/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/02/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/09/02/1" }, { "reference_url": "http://www.securityfocus.com/bid/69472", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69472" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2432-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2432-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135840", "reference_id": "1135840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135840" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6656", "reference_id": "CVE-2012-6656", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/2432-1/", "reference_id": "USN-2432-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2432-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2012-6656" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54359?format=api", "vulnerability_id": "VCID-hkyd-8rrg-v3e7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75142", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75188", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75187", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75213", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75219", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75208", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888", "reference_id": "681888", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943", "reference_id": "826943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1097", "reference_id": "RHSA-2012:1097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098", "reference_id": "RHSA-2012:1098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200", "reference_id": "RHSA-2012:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1200" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2012-3406" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61770?format=api", "vulnerability_id": "VCID-kpcn-f4dw-97hm", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21653", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21651", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21874", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21703", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21732", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21683", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544", "reference_id": "717544", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408", "reference_id": "976408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://usn.ubuntu.com/2985-1/", "reference_id": "USN-2985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2985-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2013-2207" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54415?format=api", "vulnerability_id": "VCID-mt93-6b2q-1faf", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.8487", "scoring_system": "epss", "scoring_elements": "0.99349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.8487", "scoring_system": "epss", "scoring_elements": "0.99347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.8487", "scoring_system": "epss", "scoring_elements": "0.9935", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.9942", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.99416", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.99415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.86662", "scoring_system": "epss", "scoring_elements": "0.99417", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.86966", "scoring_system": "epss", "scoring_elements": "0.99432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.86966", "scoring_system": "epss", "scoring_elements": "0.99431", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.86966", "scoring_system": "epss", "scoring_elements": "0.9943", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461", "reference_id": "1183461", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py", "reference_id": "CVE-2015-0235;OSVDB-117579", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb", "reference_id": "CVE-2015-0235;OSVDB-117579", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb" }, { "reference_url": "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt", "reference_id": "CVE-2015-0235;OSVDB-117579", "reference_type": "exploit", "scores": [], "url": "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0090", "reference_id": "RHSA-2015:0090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0090" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0092", "reference_id": "RHSA-2015:0092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0099", "reference_id": "RHSA-2015:0099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0101", "reference_id": "RHSA-2015:0101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0126", "reference_id": "RHSA-2015:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0126" }, { "reference_url": "https://usn.ubuntu.com/2485-1/", "reference_id": "USN-2485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2485-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2015-0235" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61774?format=api", "vulnerability_id": "VCID-nrvz-y7zn-6bgu", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.9179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91804", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91813", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91825", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91832", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91835", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91837", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91833", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.91853", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0756", "scoring_system": "epss", "scoring_elements": "0.9185", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178", "reference_id": "717178", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=985625", "reference_id": "985625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=985625" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c", "reference_id": "CVE-2013-4788;OSVDB-95392", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2013-4788" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrvz-y7zn-6bgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61765?format=api", "vulnerability_id": "VCID-rp43-q42n-jkh5", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html" }, { "reference_url": "http://osvdb.org/84710", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/84710" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1207.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1207.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1208.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1208.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42316", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42307", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42381", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42411", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.4235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42407", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42429", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42393", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42388", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480" }, { "reference_url": "http://secunia.com/advisories/50201", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50201" }, { "reference_url": "http://secunia.com/advisories/50422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50422" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=14459", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=14459" }, { "reference_url": "http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/08/13/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/08/13/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/08/13/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/08/13/6" }, { "reference_url": "http://www.securityfocus.com/bid/54982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/54982" }, { "reference_url": "http://www.securitytracker.com/id?1027374", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027374" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1589-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1589-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715", "reference_id": "847715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "reference_id": "CVE-2012-3480", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c", "reference_id": "CVE-2012-3480;OSVDB-84710", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c" }, { "reference_url": "https://www.securityfocus.com/bid/54982/info", "reference_id": "CVE-2012-3480;OSVDB-84710", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/54982/info" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1207", "reference_id": "RHSA-2012:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1208", "reference_id": "RHSA-2012:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1325", "reference_id": "RHSA-2012:1325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1325" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" }, { "reference_url": "https://usn.ubuntu.com/1589-2/", "reference_id": "USN-1589-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2012-3480" ], "risk_score": 8.2, "exploitability": "2.0", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rp43-q42n-jkh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61764?format=api", "vulnerability_id": "VCID-skgp-p9xp-k3cf", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71218", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71271", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71256", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.7124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71287", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71293", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.7127", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473", "reference_id": "681473", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=833704", "reference_id": "833704", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833704" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098", "reference_id": "RHSA-2012:1098", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200", "reference_id": "RHSA-2012:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1200" }, { "reference_url": "https://usn.ubuntu.com/1589-1/", "reference_id": "USN-1589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2012-3405" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skgp-p9xp-k3cf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61769?format=api", "vulnerability_id": "VCID-tdxd-r347-3yex", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1914", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03104", "scoring_system": "epss", "scoring_elements": "0.8683", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03104", "scoring_system": "epss", "scoring_elements": "0.86827", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03104", "scoring_system": "epss", "scoring_elements": "0.86831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87403", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.8741", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87359", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03398", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1914" }, { "reference_url": "https://bugzilla.novell.com/show_bug.cgi?id=813121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.novell.com/show_bug.cgi?id=813121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2021/Sep/0" }, { "reference_url": "http://secunia.com/advisories/52817", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52817" }, { "reference_url": "http://secunia.com/advisories/55113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55113" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15330", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15330" }, { "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:284", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:284" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/03/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/03/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/03/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/03/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/05/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/05/1" }, { "reference_url": "http://www.securityfocus.com/bid/58839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/58839" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1991-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1991-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623", "reference_id": "704623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=947882", "reference_id": "947882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=947882" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1914", "reference_id": "CVE-2013-1914", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1914" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0769", "reference_id": "RHSA-2013:0769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605", "reference_id": "RHSA-2013:1605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1605" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2013-1914" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61773?format=api", "vulnerability_id": "VCID-w1zk-1c5m-3fb2", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78908", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78914", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.7892", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78944", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78929", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78948", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01201", "scoring_system": "epss", "scoring_elements": "0.78945", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280", "reference_id": "1022280", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181", "reference_id": "727181", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1391", "reference_id": "RHSA-2014:1391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1391" }, { "reference_url": "https://usn.ubuntu.com/2306-1/", "reference_id": "USN-2306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2306-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2013-4458" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1zk-1c5m-3fb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61772?format=api", "vulnerability_id": "VCID-ydrg-f673-53gv", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81904", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81915", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81934", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81968", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.81971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.82007", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01645", "scoring_system": "epss", "scoring_elements": "0.82009", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007545", "reference_id": "1007545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007545" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536", "reference_id": "722536", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1411", "reference_id": "RHSA-2013:1411", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605", "reference_id": "RHSA-2013:1605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1605" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2013-4332" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrg-f673-53gv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61771?format=api", "vulnerability_id": "VCID-yh8v-ebxn-z7dp", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77497", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77528", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77538", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77547", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77558", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77594", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77592", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77586", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558", "reference_id": "719558", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839", "reference_id": "995839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1391", "reference_id": "RHSA-2014:1391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1391" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2013-4237" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yh8v-ebxn-z7dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61768?format=api", "vulnerability_id": "VCID-za5g-uj5p-5kd4", "summary": "Multiple vulnerabilities have been found in GNU C Library, the\n worst of which allowing a local attacker to execute arbitrary code or cause\n a Denial of Service .", "references": [ { "reference_url": "http://osvdb.org/89747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/89747" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.8414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84105", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84116", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84112", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02113", "scoring_system": "epss", "scoring_elements": "0.84136", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0242" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" }, { "reference_url": "http://secunia.com/advisories/51951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51951" }, { "reference_url": "http://secunia.com/advisories/55113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55113" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707" }, { "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078" }, { "reference_url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/01/30/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/01/30/5" }, { "reference_url": "http://www.securityfocus.com/bid/57638", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/57638" }, { "reference_url": "http://www.securitytracker.com/id/1028063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1028063" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1991-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1991-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399", "reference_id": "699399", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=905874", "reference_id": "905874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=905874" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0242", "reference_id": "CVE-2013-0242", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0242" }, { "reference_url": "https://security.gentoo.org/glsa/201503-04", "reference_id": "GLSA-201503-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0769", "reference_id": "RHSA-2013:0769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605", "reference_id": "RHSA-2013:1605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1605" }, { "reference_url": "https://usn.ubuntu.com/1991-1/", "reference_id": "USN-1991-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1991-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api", "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" } ], "aliases": [ "CVE-2013-0242" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1" }