Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/glibc@2.42-14?distro=trixie
Typedeb
Namespacedebian
Nameglibc
Version2.42-14
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.42-15
Latest_non_vulnerable_version2.42-15
Affected_by_vulnerabilities
0
url VCID-us68-psx5-zude
vulnerability_id VCID-us68-psx5-zude
summary glibc: glibc: Denial of Service via iconv() function with specific character sets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4046.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4046
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12268
published_at 2026-04-04T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12223
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14041
published_at 2026-04-18T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14246
published_at 2026-04-11T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.143
published_at 2026-04-09T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14208
published_at 2026-04-12T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14151
published_at 2026-04-13T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14042
published_at 2026-04-16T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16379
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4046
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4046
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132499
reference_id 1132499
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132499
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453117
reference_id 2453117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453117
6
reference_url https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD
reference_id GLIBC-SA-2026-0007;hb=HEAD
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T17:33:59Z/
url https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33980
reference_id show_bug.cgi?id=33980
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T17:33:59Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33980
fixed_packages
0
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2026-4046
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-us68-psx5-zude
Fixing_vulnerabilities
0
url VCID-13gq-1x22-skhy
vulnerability_id VCID-13gq-1x22-skhy
summary
Multiple vulnerabilities in glibc could result in Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27618
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.1686
published_at 2026-04-01T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16819
published_at 2026-04-18T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17028
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17082
published_at 2026-04-04T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16863
published_at 2026-04-07T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16952
published_at 2026-04-08T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.1701
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16985
published_at 2026-04-11T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16939
published_at 2026-04-12T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16881
published_at 2026-04-13T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16817
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1893708
reference_id 1893708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1893708
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914
reference_id 973914
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914
6
reference_url https://security.archlinux.org/ASA-202102-16
reference_id ASA-202102-16
reference_type
scores
url https://security.archlinux.org/ASA-202102-16
7
reference_url https://security.archlinux.org/ASA-202102-17
reference_id ASA-202102-17
reference_type
scores
url https://security.archlinux.org/ASA-202102-17
8
reference_url https://security.archlinux.org/AVG-1320
reference_id AVG-1320
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1320
9
reference_url https://security.gentoo.org/glsa/202107-07
reference_id GLSA-202107-07
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/
url https://security.gentoo.org/glsa/202107-07
10
reference_url https://security.netapp.com/advisory/ntap-20210401-0006/
reference_id ntap-20210401-0006
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/
url https://security.netapp.com/advisory/ntap-20210401-0006/
11
reference_url https://access.redhat.com/errata/RHSA-2021:1585
reference_id RHSA-2021:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1585
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
reference_id show_bug.cgi?id=19519#c21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
13
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=26224
reference_id show_bug.cgi?id=26224
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=26224
14
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
15
reference_url https://usn.ubuntu.com/5768-1/
reference_id USN-5768-1
reference_type
scores
url https://usn.ubuntu.com/5768-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-5?distro=trixie
purl pkg:deb/debian/glibc@2.31-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-5%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2020-27618
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13gq-1x22-skhy
1
url VCID-1971-5hzf-43dt
vulnerability_id VCID-1971-5hzf-43dt
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
1
reference_url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
2
reference_url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4043
reference_id
reference_type
scores
0
value 0.01643
scoring_system epss
scoring_elements 0.81991
published_at 2026-04-18T12:55:00Z
1
value 0.01643
scoring_system epss
scoring_elements 0.81888
published_at 2026-04-01T12:55:00Z
2
value 0.01643
scoring_system epss
scoring_elements 0.81899
published_at 2026-04-02T12:55:00Z
3
value 0.01643
scoring_system epss
scoring_elements 0.81922
published_at 2026-04-04T12:55:00Z
4
value 0.01643
scoring_system epss
scoring_elements 0.81918
published_at 2026-04-07T12:55:00Z
5
value 0.01643
scoring_system epss
scoring_elements 0.81945
published_at 2026-04-08T12:55:00Z
6
value 0.01643
scoring_system epss
scoring_elements 0.81952
published_at 2026-04-09T12:55:00Z
7
value 0.01643
scoring_system epss
scoring_elements 0.81972
published_at 2026-04-11T12:55:00Z
8
value 0.01643
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-12T12:55:00Z
9
value 0.01643
scoring_system epss
scoring_elements 0.81956
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
11
reference_url http://seclists.org/fulldisclosure/2019/Jun/18
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jun/18
12
reference_url http://seclists.org/fulldisclosure/2019/Sep/7
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Sep/7
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
14
reference_url https://seclists.org/bugtraq/2019/Jun/14
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jun/14
15
reference_url https://seclists.org/bugtraq/2019/Sep/7
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/7
16
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17048
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17048
17
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
18
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
19
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
21
reference_url http://www.securityfocus.com/bid/68006
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68006
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1109263
reference_id 1109263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1109263
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774
reference_id 751774
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4043
reference_id CVE-2014-4043
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4043
27
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
28
reference_url https://usn.ubuntu.com/2306-1/
reference_id USN-2306-1
reference_type
scores
url https://usn.ubuntu.com/2306-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-2?distro=trixie
purl pkg:deb/debian/glibc@2.19-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-4043
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt
2
url VCID-22vv-9xn4-vyap
vulnerability_id VCID-22vv-9xn4-vyap
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3404
reference_id
reference_type
scores
0
value 0.00604
scoring_system epss
scoring_elements 0.6952
published_at 2026-04-01T12:55:00Z
1
value 0.00604
scoring_system epss
scoring_elements 0.69531
published_at 2026-04-02T12:55:00Z
2
value 0.00604
scoring_system epss
scoring_elements 0.69546
published_at 2026-04-04T12:55:00Z
3
value 0.00604
scoring_system epss
scoring_elements 0.69525
published_at 2026-04-07T12:55:00Z
4
value 0.00604
scoring_system epss
scoring_elements 0.69575
published_at 2026-04-08T12:55:00Z
5
value 0.00604
scoring_system epss
scoring_elements 0.69592
published_at 2026-04-09T12:55:00Z
6
value 0.00604
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-11T12:55:00Z
7
value 0.00604
scoring_system epss
scoring_elements 0.69599
published_at 2026-04-12T12:55:00Z
8
value 0.00604
scoring_system epss
scoring_elements 0.69585
published_at 2026-04-13T12:55:00Z
9
value 0.00604
scoring_system epss
scoring_elements 0.69624
published_at 2026-04-16T12:55:00Z
10
value 0.00604
scoring_system epss
scoring_elements 0.69633
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
reference_id 681473
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=833703
reference_id 833703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=833703
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2012:1098
reference_id RHSA-2012:1098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1098
7
reference_url https://access.redhat.com/errata/RHSA-2012:1200
reference_id RHSA-2012:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1200
8
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.13-35?distro=trixie
purl pkg:deb/debian/glibc@2.13-35?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-35%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2012-3404
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22vv-9xn4-vyap
3
url VCID-2gmq-64e3-c7db
vulnerability_id VCID-2gmq-64e3-c7db
summary Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23218
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59469
published_at 2026-04-16T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.59476
published_at 2026-04-18T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.65785
published_at 2026-04-13T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65815
published_at 2026-04-12T12:55:00Z
4
value 0.00523
scoring_system epss
scoring_elements 0.66885
published_at 2026-04-07T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.66886
published_at 2026-04-02T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66912
published_at 2026-04-04T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.66934
published_at 2026-04-08T12:55:00Z
8
value 0.00523
scoring_system epss
scoring_elements 0.66967
published_at 2026-04-11T12:55:00Z
9
value 0.00523
scoring_system epss
scoring_elements 0.66947
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2042013
reference_id 2042013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2042013
5
reference_url https://security.gentoo.org/glsa/202208-24
reference_id GLSA-202208-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/
url https://security.gentoo.org/glsa/202208-24
6
reference_url https://access.redhat.com/errata/RHSA-2022:0896
reference_id RHSA-2022:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0896
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=28768
reference_id show_bug.cgi?id=28768
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=28768
8
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
9
reference_url https://usn.ubuntu.com/5310-2/
reference_id USN-5310-2
reference_type
scores
url https://usn.ubuntu.com/5310-2/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.33-3?distro=trixie
purl pkg:deb/debian/glibc@2.33-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-3%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2022-23218
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gmq-64e3-c7db
4
url VCID-2pd1-hkrf-j7e5
vulnerability_id VCID-2pd1-hkrf-j7e5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7424
reference_id
reference_type
scores
0
value 0.00831
scoring_system epss
scoring_elements 0.74501
published_at 2026-04-01T12:55:00Z
1
value 0.00831
scoring_system epss
scoring_elements 0.74505
published_at 2026-04-02T12:55:00Z
2
value 0.00831
scoring_system epss
scoring_elements 0.74532
published_at 2026-04-04T12:55:00Z
3
value 0.00831
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-07T12:55:00Z
4
value 0.00831
scoring_system epss
scoring_elements 0.74538
published_at 2026-04-08T12:55:00Z
5
value 0.00831
scoring_system epss
scoring_elements 0.74554
published_at 2026-04-09T12:55:00Z
6
value 0.00831
scoring_system epss
scoring_elements 0.74576
published_at 2026-04-11T12:55:00Z
7
value 0.00831
scoring_system epss
scoring_elements 0.74557
published_at 2026-04-12T12:55:00Z
8
value 0.00831
scoring_system epss
scoring_elements 0.74549
published_at 2026-04-13T12:55:00Z
9
value 0.00831
scoring_system epss
scoring_elements 0.74587
published_at 2026-04-16T12:55:00Z
10
value 0.00831
scoring_system epss
scoring_elements 0.74594
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1186614
reference_id 1186614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1186614
9
reference_url https://access.redhat.com/errata/RHSA-2014:1391
reference_id RHSA-2014:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1391
10
reference_url https://access.redhat.com/errata/RHSA-2015:1627
reference_id RHSA-2015:1627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1627
fixed_packages
0
url pkg:deb/debian/glibc@2.15-1?distro=trixie
purl pkg:deb/debian/glibc@2.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.15-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-7424
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pd1-hkrf-j7e5
5
url VCID-2tet-rxt9-n3ac
vulnerability_id VCID-2tet-rxt9-n3ac
summary glibc: scanf implementation crashes on certain inputs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5320.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-5320
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18727
published_at 2026-04-18T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18715
published_at 2026-04-16T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18814
published_at 2026-04-01T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18952
published_at 2026-04-02T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.19005
published_at 2026-04-04T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18728
published_at 2026-04-07T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18808
published_at 2026-04-08T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18859
published_at 2026-04-09T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18863
published_at 2026-04-11T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18816
published_at 2026-04-12T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18763
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-5320
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5320
3
reference_url https://marc.info/?l=gimp-developer&m=129567990905823&w=2
reference_id
reference_type
scores
url https://marc.info/?l=gimp-developer&m=129567990905823&w=2
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4
5
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=20b38e0
reference_id
reference_type
scores
url https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=20b38e0
6
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=3f8cc204fdd0
reference_id
reference_type
scores
url https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=3f8cc204fdd0
7
reference_url http://www.openwall.com/lists/oss-security/2015/03/12/14
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/03/12/14
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1196745
reference_id 1196745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1196745
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-5320
reference_id CVE-2011-5320
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2011-5320
fixed_packages
0
url pkg:deb/debian/glibc@2.15?distro=trixie
purl pkg:deb/debian/glibc@2.15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.15%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2011-5320
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tet-rxt9-n3ac
6
url VCID-2tgj-syh1-pqaj
vulnerability_id VCID-2tgj-syh1-pqaj
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which allows context-dependent attackers to execute arbitrary
    code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
6
reference_url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
7
reference_url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2017-0680.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0680.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9761
reference_id
reference_type
scores
0
value 0.03577
scoring_system epss
scoring_elements 0.87751
published_at 2026-04-18T12:55:00Z
1
value 0.03823
scoring_system epss
scoring_elements 0.88127
published_at 2026-04-08T12:55:00Z
2
value 0.03823
scoring_system epss
scoring_elements 0.88136
published_at 2026-04-13T12:55:00Z
3
value 0.03823
scoring_system epss
scoring_elements 0.8815
published_at 2026-04-16T12:55:00Z
4
value 0.03823
scoring_system epss
scoring_elements 0.88087
published_at 2026-04-02T12:55:00Z
5
value 0.03823
scoring_system epss
scoring_elements 0.88103
published_at 2026-04-04T12:55:00Z
6
value 0.03823
scoring_system epss
scoring_elements 0.88108
published_at 2026-04-07T12:55:00Z
7
value 0.03823
scoring_system epss
scoring_elements 0.88078
published_at 2026-04-01T12:55:00Z
8
value 0.03823
scoring_system epss
scoring_elements 0.88133
published_at 2026-04-09T12:55:00Z
9
value 0.03823
scoring_system epss
scoring_elements 0.88143
published_at 2026-04-11T12:55:00Z
10
value 0.03823
scoring_system epss
scoring_elements 0.88135
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9761
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761
12
reference_url http://seclists.org/fulldisclosure/2019/Jun/18
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jun/18
13
reference_url http://seclists.org/fulldisclosure/2019/Sep/7
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Sep/7
14
reference_url https://seclists.org/bugtraq/2019/Jun/14
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jun/14
15
reference_url https://seclists.org/bugtraq/2019/Sep/7
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/7
16
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=16962
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=16962
17
reference_url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
reference_id
reference_type
scores
url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
18
reference_url http://www.openwall.com/lists/oss-security/2016/01/19/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/19/11
19
reference_url http://www.openwall.com/lists/oss-security/2016/01/20/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/20/1
20
reference_url http://www.securityfocus.com/bid/83306
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83306
21
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
22
reference_url http://www.ubuntu.com/usn/USN-2985-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-2
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1300310
reference_id 1300310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1300310
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187
reference_id 813187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9761
reference_id CVE-2014-9761
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9761
49
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
50
reference_url https://access.redhat.com/errata/RHSA-2017:0680
reference_id RHSA-2017:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0680
51
reference_url https://access.redhat.com/errata/RHSA-2017:1916
reference_id RHSA-2017:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1916
52
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.23-1?distro=trixie
purl pkg:deb/debian/glibc@2.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-9761
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tgj-syh1-pqaj
7
url VCID-3e43-r92j-hkd3
vulnerability_id VCID-3e43-r92j-hkd3
summary glibc: glibc: Incorrect DNS response parsing via crafted DNS server response
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4437.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4437.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4437
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14041
published_at 2026-04-18T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14246
published_at 2026-04-11T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.143
published_at 2026-04-09T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14208
published_at 2026-04-12T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14151
published_at 2026-04-13T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14042
published_at 2026-04-16T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16517
published_at 2026-04-02T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16579
published_at 2026-04-04T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16379
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4437
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4437
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131435
reference_id 1131435
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131435
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449777
reference_id 2449777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449777
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=34014
reference_id show_bug.cgi?id=34014
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-23T15:10:34Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=34014
fixed_packages
0
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2026-4437
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3e43-r92j-hkd3
8
url VCID-3hqs-jns2-puf2
vulnerability_id VCID-3hqs-jns2-puf2
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33599
reference_id
reference_type
scores
0
value 0.00624
scoring_system epss
scoring_elements 0.70205
published_at 2026-04-18T12:55:00Z
1
value 0.00624
scoring_system epss
scoring_elements 0.70102
published_at 2026-04-02T12:55:00Z
2
value 0.00624
scoring_system epss
scoring_elements 0.70116
published_at 2026-04-04T12:55:00Z
3
value 0.00624
scoring_system epss
scoring_elements 0.70094
published_at 2026-04-07T12:55:00Z
4
value 0.00624
scoring_system epss
scoring_elements 0.70141
published_at 2026-04-08T12:55:00Z
5
value 0.00624
scoring_system epss
scoring_elements 0.70157
published_at 2026-04-09T12:55:00Z
6
value 0.00624
scoring_system epss
scoring_elements 0.7018
published_at 2026-04-11T12:55:00Z
7
value 0.00624
scoring_system epss
scoring_elements 0.70165
published_at 2026-04-12T12:55:00Z
8
value 0.00624
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-13T12:55:00Z
9
value 0.00624
scoring_system epss
scoring_elements 0.70196
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277202
reference_id 2277202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277202
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
reference_id GLIBC-SA-2024-0005
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0011/
reference_id ntap-20240524-0011
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/
url https://security.netapp.com/advisory/ntap-20240524-0011/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-19?distro=trixie
purl pkg:deb/debian/glibc@2.37-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2024-33599
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2
9
url VCID-3yq4-pzqz-4yap
vulnerability_id VCID-3yq4-pzqz-4yap
summary glibc: ldd unexpected code execution issue
references
0
reference_url http://openwall.com/lists/oss-security/2011/03/07/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/07/10
1
reference_url http://openwall.com/lists/oss-security/2011/03/07/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/07/13
2
reference_url http://openwall.com/lists/oss-security/2011/03/07/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/07/7
3
reference_url http://openwall.com/lists/oss-security/2011/03/08/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/1
4
reference_url http://openwall.com/lists/oss-security/2011/03/08/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/10
5
reference_url http://openwall.com/lists/oss-security/2011/03/08/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/2
6
reference_url http://openwall.com/lists/oss-security/2011/03/08/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/3
7
reference_url http://openwall.com/lists/oss-security/2011/03/08/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/7
8
reference_url http://reverse.lostrealm.com/protect/ldd.html
reference_id
reference_type
scores
url http://reverse.lostrealm.com/protect/ldd.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5064.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5064.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5064
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25579
published_at 2026-04-18T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25679
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25749
published_at 2026-04-02T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.2579
published_at 2026-04-04T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25559
published_at 2026-04-07T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25632
published_at 2026-04-08T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25678
published_at 2026-04-09T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25689
published_at 2026-04-11T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25648
published_at 2026-04-12T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25591
published_at 2026-04-13T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25594
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5064
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=531160
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=531160
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=682998
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=682998
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5064
14
reference_url http://www.catonmat.net/blog/ldd-arbitrary-code-execution/
reference_id
reference_type
scores
url http://www.catonmat.net/blog/ldd-arbitrary-code-execution/
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-1526.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-1526.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=692393
reference_id 692393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=692393
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-5064
reference_id CVE-2009-5064
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-5064
41
reference_url https://access.redhat.com/errata/RHSA-2011:1526
reference_id RHSA-2011:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1526
42
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
43
reference_url https://access.redhat.com/errata/RHSA-2012:0126
reference_id RHSA-2012:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0126
fixed_packages
0
url pkg:deb/debian/glibc@2.10.1-7?distro=trixie
purl pkg:deb/debian/glibc@2.10.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.10.1-7%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2009-5064
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yq4-pzqz-4yap
10
url VCID-42jj-9jmf-s3h5
vulnerability_id VCID-42jj-9jmf-s3h5
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4424
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.6964
published_at 2026-04-01T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69652
published_at 2026-04-02T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69668
published_at 2026-04-04T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69645
published_at 2026-04-07T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-08T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.69713
published_at 2026-04-09T12:55:00Z
6
value 0.00608
scoring_system epss
scoring_elements 0.69735
published_at 2026-04-11T12:55:00Z
7
value 0.00608
scoring_system epss
scoring_elements 0.6972
published_at 2026-04-12T12:55:00Z
8
value 0.00608
scoring_system epss
scoring_elements 0.69707
published_at 2026-04-13T12:55:00Z
9
value 0.00608
scoring_system epss
scoring_elements 0.69747
published_at 2026-04-16T12:55:00Z
10
value 0.00608
scoring_system epss
scoring_elements 0.69756
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423
reference_id 689423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=858238
reference_id 858238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=858238
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.17-94?distro=trixie
purl pkg:deb/debian/glibc@2.17-94?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2012-4424
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42jj-9jmf-s3h5
11
url VCID-481z-kryb-97d5
vulnerability_id VCID-481z-kryb-97d5
summary glibc: strfmon format string problem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1391.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1391.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1391
reference_id
reference_type
scores
0
value 0.19061
scoring_system epss
scoring_elements 0.95296
published_at 2026-04-01T12:55:00Z
1
value 0.19061
scoring_system epss
scoring_elements 0.95307
published_at 2026-04-02T12:55:00Z
2
value 0.19061
scoring_system epss
scoring_elements 0.95313
published_at 2026-04-04T12:55:00Z
3
value 0.19061
scoring_system epss
scoring_elements 0.95318
published_at 2026-04-07T12:55:00Z
4
value 0.19061
scoring_system epss
scoring_elements 0.95325
published_at 2026-04-08T12:55:00Z
5
value 0.19061
scoring_system epss
scoring_elements 0.95328
published_at 2026-04-09T12:55:00Z
6
value 0.19061
scoring_system epss
scoring_elements 0.95333
published_at 2026-04-12T12:55:00Z
7
value 0.19061
scoring_system epss
scoring_elements 0.95335
published_at 2026-04-13T12:55:00Z
8
value 0.19061
scoring_system epss
scoring_elements 0.95343
published_at 2026-04-16T12:55:00Z
9
value 0.19061
scoring_system epss
scoring_elements 0.95346
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1391
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=524671
reference_id 524671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=524671
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/31550.c
reference_id CVE-2008-1391;OSVDB-43837
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/31550.c
5
reference_url https://www.securityfocus.com/bid/28479/info
reference_id CVE-2008-1391;OSVDB-43837
reference_type exploit
scores
url https://www.securityfocus.com/bid/28479/info
6
reference_url https://usn.ubuntu.com/944-1/
reference_id USN-944-1
reference_type
scores
url https://usn.ubuntu.com/944-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.11-1?distro=trixie
purl pkg:deb/debian/glibc@2.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2008-1391
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-481z-kryb-97d5
12
url VCID-4nf7-929x-4bb1
vulnerability_id VCID-4nf7-929x-4bb1
summary glibc: nscd buffer manipulation vulnerability could lead to code execution or crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9984
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65872
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65996
published_at 2026-04-18T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65948
published_at 2026-04-13T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65983
published_at 2026-04-16T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65913
published_at 2026-04-02T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65943
published_at 2026-04-04T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.65909
published_at 2026-04-07T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65961
published_at 2026-04-08T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65973
published_at 2026-04-09T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.65991
published_at 2026-04-11T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.65978
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9984
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1463288
reference_id 1463288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1463288
5
reference_url https://usn.ubuntu.com/6762-1/
reference_id USN-6762-1
reference_type
scores
url https://usn.ubuntu.com/6762-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-14?distro=trixie
purl pkg:deb/debian/glibc@2.19-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-9984
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4nf7-929x-4bb1
13
url VCID-5g37-r914-r3g8
vulnerability_id VCID-5g37-r914-r3g8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1473
reference_id
reference_type
scores
0
value 0.00449
scoring_system epss
scoring_elements 0.63503
published_at 2026-04-01T12:55:00Z
1
value 0.00449
scoring_system epss
scoring_elements 0.63563
published_at 2026-04-02T12:55:00Z
2
value 0.00449
scoring_system epss
scoring_elements 0.6359
published_at 2026-04-04T12:55:00Z
3
value 0.00449
scoring_system epss
scoring_elements 0.63554
published_at 2026-04-07T12:55:00Z
4
value 0.00449
scoring_system epss
scoring_elements 0.63606
published_at 2026-04-08T12:55:00Z
5
value 0.00449
scoring_system epss
scoring_elements 0.63623
published_at 2026-04-09T12:55:00Z
6
value 0.00449
scoring_system epss
scoring_elements 0.63638
published_at 2026-04-11T12:55:00Z
7
value 0.00449
scoring_system epss
scoring_elements 0.63622
published_at 2026-04-12T12:55:00Z
8
value 0.00449
scoring_system epss
scoring_elements 0.63589
published_at 2026-04-13T12:55:00Z
9
value 0.00449
scoring_system epss
scoring_elements 0.63625
published_at 2026-04-16T12:55:00Z
10
value 0.00449
scoring_system epss
scoring_elements 0.63634
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1473
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1209105
reference_id 1209105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1209105
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197
reference_id 777197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197
10
reference_url https://access.redhat.com/errata/RHSA-2015:2199
reference_id RHSA-2015:2199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2199
11
reference_url https://access.redhat.com/errata/RHSA-2015:2589
reference_id RHSA-2015:2589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2589
12
reference_url https://usn.ubuntu.com/2519-1/
reference_id USN-2519-1
reference_type
scores
url https://usn.ubuntu.com/2519-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-15?distro=trixie
purl pkg:deb/debian/glibc@2.19-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-1473
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5g37-r914-r3g8
14
url VCID-6fwn-j4p2-ffh9
vulnerability_id VCID-6fwn-j4p2-ffh9
summary glibc NIS password hash disclosure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0015.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0015
reference_id
reference_type
scores
0
value 0.01544
scoring_system epss
scoring_elements 0.81396
published_at 2026-04-12T12:55:00Z
1
value 0.01544
scoring_system epss
scoring_elements 0.81388
published_at 2026-04-13T12:55:00Z
2
value 0.01544
scoring_system epss
scoring_elements 0.81425
published_at 2026-04-16T12:55:00Z
3
value 0.01544
scoring_system epss
scoring_elements 0.81426
published_at 2026-04-18T12:55:00Z
4
value 0.01817
scoring_system epss
scoring_elements 0.82844
published_at 2026-04-08T12:55:00Z
5
value 0.01817
scoring_system epss
scoring_elements 0.82793
published_at 2026-04-01T12:55:00Z
6
value 0.01817
scoring_system epss
scoring_elements 0.82866
published_at 2026-04-11T12:55:00Z
7
value 0.01817
scoring_system epss
scoring_elements 0.8285
published_at 2026-04-09T12:55:00Z
8
value 0.01817
scoring_system epss
scoring_elements 0.82809
published_at 2026-04-02T12:55:00Z
9
value 0.01817
scoring_system epss
scoring_elements 0.82823
published_at 2026-04-04T12:55:00Z
10
value 0.01817
scoring_system epss
scoring_elements 0.82818
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0015
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=555573
reference_id 555573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=555573
4
reference_url https://usn.ubuntu.com/1396-1/
reference_id USN-1396-1
reference_type
scores
url https://usn.ubuntu.com/1396-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.10.2-4?distro=trixie
purl pkg:deb/debian/glibc@2.10.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.10.2-4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2010-0015
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fwn-j4p2-ffh9
15
url VCID-6kb1-yuq8-tfbs
vulnerability_id VCID-6kb1-yuq8-tfbs
summary glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19126
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06399
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06388
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06327
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.0631
published_at 2026-04-02T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06344
published_at 2026-04-04T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06321
published_at 2026-04-07T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06369
published_at 2026-04-08T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06412
published_at 2026-04-09T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=25204
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=25204
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774681
reference_id 1774681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774681
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250
reference_id 945250
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19126
reference_id CVE-2019-19126
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-19126
18
reference_url https://access.redhat.com/errata/RHSA-2020:1828
reference_id RHSA-2020:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1828
19
reference_url https://access.redhat.com/errata/RHSA-2020:3861
reference_id RHSA-2020:3861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3861
20
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
21
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.29-8?distro=trixie
purl pkg:deb/debian/glibc@2.29-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.29-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2019-19126
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6kb1-yuq8-tfbs
16
url VCID-6qa1-upks-g3dm
vulnerability_id VCID-6qa1-upks-g3dm
summary Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3999
reference_id
reference_type
scores
0
value 0.00848
scoring_system epss
scoring_elements 0.74892
published_at 2026-04-18T12:55:00Z
1
value 0.00848
scoring_system epss
scoring_elements 0.74805
published_at 2026-04-01T12:55:00Z
2
value 0.00848
scoring_system epss
scoring_elements 0.74806
published_at 2026-04-02T12:55:00Z
3
value 0.00848
scoring_system epss
scoring_elements 0.74835
published_at 2026-04-04T12:55:00Z
4
value 0.00848
scoring_system epss
scoring_elements 0.74808
published_at 2026-04-07T12:55:00Z
5
value 0.00848
scoring_system epss
scoring_elements 0.74841
published_at 2026-04-08T12:55:00Z
6
value 0.00848
scoring_system epss
scoring_elements 0.74855
published_at 2026-04-09T12:55:00Z
7
value 0.00848
scoring_system epss
scoring_elements 0.74879
published_at 2026-04-11T12:55:00Z
8
value 0.00848
scoring_system epss
scoring_elements 0.74858
published_at 2026-04-12T12:55:00Z
9
value 0.00848
scoring_system epss
scoring_elements 0.74849
published_at 2026-04-13T12:55:00Z
10
value 0.00848
scoring_system epss
scoring_elements 0.74885
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3999
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024637
reference_id 2024637
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2024637
5
reference_url https://www.openwall.com/lists/oss-security/2022/01/24/4
reference_id 4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/
url https://www.openwall.com/lists/oss-security/2022/01/24/4
6
reference_url https://security.archlinux.org/AVG-1621
reference_id AVG-1621
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1621
7
reference_url https://access.redhat.com/security/cve/CVE-2021-3999
reference_id CVE-2021-3999
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/
url https://access.redhat.com/security/cve/CVE-2021-3999
8
reference_url https://security-tracker.debian.org/tracker/CVE-2021-3999
reference_id CVE-2021-3999
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/
url https://security-tracker.debian.org/tracker/CVE-2021-3999
9
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
reference_id gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
10
reference_url https://security.gentoo.org/glsa/202208-24
reference_id GLSA-202208-24
reference_type
scores
url https://security.gentoo.org/glsa/202208-24
11
reference_url https://security.netapp.com/advisory/ntap-20221104-0001/
reference_id ntap-20221104-0001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/
url https://security.netapp.com/advisory/ntap-20221104-0001/
12
reference_url https://access.redhat.com/errata/RHSA-2022:0896
reference_id RHSA-2022:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0896
13
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=28769
reference_id show_bug.cgi?id=28769
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=28769
14
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
15
reference_url https://usn.ubuntu.com/5310-2/
reference_id USN-5310-2
reference_type
scores
url https://usn.ubuntu.com/5310-2/
16
reference_url https://usn.ubuntu.com/6762-1/
reference_id USN-6762-1
reference_type
scores
url https://usn.ubuntu.com/6762-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.33-4?distro=trixie
purl pkg:deb/debian/glibc@2.33-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-4%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-3999
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm
17
url VCID-6t8d-48g7-1yey
vulnerability_id VCID-6t8d-48g7-1yey
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
6
reference_url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2017-0680.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0680.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8779
reference_id
reference_type
scores
0
value 0.05694
scoring_system epss
scoring_elements 0.90423
published_at 2026-04-18T12:55:00Z
1
value 0.09682
scoring_system epss
scoring_elements 0.92909
published_at 2026-04-08T12:55:00Z
2
value 0.09682
scoring_system epss
scoring_elements 0.92917
published_at 2026-04-13T12:55:00Z
3
value 0.09682
scoring_system epss
scoring_elements 0.92927
published_at 2026-04-16T12:55:00Z
4
value 0.09682
scoring_system epss
scoring_elements 0.92897
published_at 2026-04-02T12:55:00Z
5
value 0.09682
scoring_system epss
scoring_elements 0.92902
published_at 2026-04-04T12:55:00Z
6
value 0.09682
scoring_system epss
scoring_elements 0.92901
published_at 2026-04-07T12:55:00Z
7
value 0.09682
scoring_system epss
scoring_elements 0.92889
published_at 2026-04-01T12:55:00Z
8
value 0.09682
scoring_system epss
scoring_elements 0.92914
published_at 2026-04-09T12:55:00Z
9
value 0.09682
scoring_system epss
scoring_elements 0.92918
published_at 2026-04-11T12:55:00Z
10
value 0.09682
scoring_system epss
scoring_elements 0.92916
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8779
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
17
reference_url http://seclists.org/fulldisclosure/2019/Sep/7
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Sep/7
18
reference_url https://seclists.org/bugtraq/2019/Sep/7
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/7
19
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17905
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17905
20
reference_url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
reference_id
reference_type
scores
url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
21
reference_url http://www.debian.org/security/2016/dsa-3480
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3480
22
reference_url http://www.debian.org/security/2016/dsa-3481
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3481
23
reference_url http://www.openwall.com/lists/oss-security/2016/01/19/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/19/11
24
reference_url http://www.openwall.com/lists/oss-security/2016/01/20/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/20/1
25
reference_url http://www.securityfocus.com/bid/82244
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82244
26
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
27
reference_url http://www.ubuntu.com/usn/USN-2985-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-2
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1300312
reference_id 1300312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1300312
29
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455
reference_id 812455
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8779
reference_id CVE-2015-8779
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8779
55
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
56
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
57
reference_url https://access.redhat.com/errata/RHSA-2017:0680
reference_id RHSA-2017:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0680
58
reference_url https://access.redhat.com/errata/RHSA-2017:1916
reference_id RHSA-2017:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1916
59
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-7?distro=trixie
purl pkg:deb/debian/glibc@2.21-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-7%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8779
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6t8d-48g7-1yey
18
url VCID-746m-vcyt-97gh
vulnerability_id VCID-746m-vcyt-97gh
summary
Multiple vulnerabilities have been found in GNU C Library, the
    worst of which allowing arbitrary code execution and privilege escalation.
references
0
reference_url http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/
reference_id
reference_type
scores
url http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/
1
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5029.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5029.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5029
reference_id
reference_type
scores
0
value 0.02765
scoring_system epss
scoring_elements 0.8605
published_at 2026-04-18T12:55:00Z
1
value 0.02765
scoring_system epss
scoring_elements 0.86032
published_at 2026-04-12T12:55:00Z
2
value 0.02765
scoring_system epss
scoring_elements 0.86027
published_at 2026-04-13T12:55:00Z
3
value 0.02765
scoring_system epss
scoring_elements 0.86045
published_at 2026-04-16T12:55:00Z
4
value 0.05109
scoring_system epss
scoring_elements 0.89837
published_at 2026-04-08T12:55:00Z
5
value 0.05109
scoring_system epss
scoring_elements 0.89799
published_at 2026-04-01T12:55:00Z
6
value 0.05109
scoring_system epss
scoring_elements 0.8985
published_at 2026-04-11T12:55:00Z
7
value 0.05109
scoring_system epss
scoring_elements 0.89844
published_at 2026-04-09T12:55:00Z
8
value 0.05109
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-02T12:55:00Z
9
value 0.05109
scoring_system epss
scoring_elements 0.89816
published_at 2026-04-04T12:55:00Z
10
value 0.05109
scoring_system epss
scoring_elements 0.8982
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5029
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029
5
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2
6
reference_url http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html
reference_id
reference_type
scores
url http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=761245
reference_id 761245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=761245
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-5029
reference_id CVE-2009-5029
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-5029
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36404.c
reference_id CVE-2009-5029;OSVDB-77508
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36404.c
25
reference_url https://www.securityfocus.com/bid/50898/info
reference_id CVE-2009-5029;OSVDB-77508
reference_type exploit
scores
url https://www.securityfocus.com/bid/50898/info
26
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
27
reference_url https://access.redhat.com/errata/RHSA-2012:0058
reference_id RHSA-2012:0058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0058
28
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
29
reference_url https://access.redhat.com/errata/RHSA-2012:0126
reference_id RHSA-2012:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0126
30
reference_url https://usn.ubuntu.com/1396-1/
reference_id USN-1396-1
reference_type
scores
url https://usn.ubuntu.com/1396-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.13-24?distro=trixie
purl pkg:deb/debian/glibc@2.13-24?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-24%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2009-5029
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-746m-vcyt-97gh
19
url VCID-75dc-1fd5-u3e2
vulnerability_id VCID-75dc-1fd5-u3e2
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9169
reference_id
reference_type
scores
0
value 0.0708
scoring_system epss
scoring_elements 0.91536
published_at 2026-04-18T12:55:00Z
1
value 0.0708
scoring_system epss
scoring_elements 0.91541
published_at 2026-04-16T12:55:00Z
2
value 0.12135
scoring_system epss
scoring_elements 0.93818
published_at 2026-04-13T12:55:00Z
3
value 0.13732
scoring_system epss
scoring_elements 0.94228
published_at 2026-04-01T12:55:00Z
4
value 0.13732
scoring_system epss
scoring_elements 0.94238
published_at 2026-04-02T12:55:00Z
5
value 0.13732
scoring_system epss
scoring_elements 0.94249
published_at 2026-04-04T12:55:00Z
6
value 0.13732
scoring_system epss
scoring_elements 0.9425
published_at 2026-04-07T12:55:00Z
7
value 0.13732
scoring_system epss
scoring_elements 0.94259
published_at 2026-04-08T12:55:00Z
8
value 0.13732
scoring_system epss
scoring_elements 0.94264
published_at 2026-04-09T12:55:00Z
9
value 0.13732
scoring_system epss
scoring_elements 0.94268
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9169
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
3
reference_url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
reference_id
reference_type
scores
url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
4
reference_url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
reference_id
reference_type
scores
url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10278
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10278
7
reference_url https://security.netapp.com/advisory/ntap-20190315-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0002/
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24114
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24114
9
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
10
reference_url https://support.f5.com/csp/article/K54823184
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K54823184
11
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2022.html
12
reference_url http://www.securityfocus.com/bid/107160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107160
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1684057
reference_id 1684057
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1684057
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612
reference_id 924612
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612
15
reference_url https://security.archlinux.org/ASA-201911-3
reference_id ASA-201911-3
reference_type
scores
url https://security.archlinux.org/ASA-201911-3
16
reference_url https://security.archlinux.org/AVG-855
reference_id AVG-855
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-855
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9169
reference_id CVE-2019-9169
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9169
26
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
27
reference_url https://access.redhat.com/errata/RHSA-2021:1585
reference_id RHSA-2021:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1585
28
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.28-9?distro=trixie
purl pkg:deb/debian/glibc@2.28-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-9%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2019-9169
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75dc-1fd5-u3e2
20
url VCID-7be7-f2ha-r7h6
vulnerability_id VCID-7be7-f2ha-r7h6
summary libbind off-by-one buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0122
reference_id
reference_type
scores
0
value 0.00923
scoring_system epss
scoring_elements 0.75931
published_at 2026-04-01T12:55:00Z
1
value 0.00923
scoring_system epss
scoring_elements 0.75934
published_at 2026-04-02T12:55:00Z
2
value 0.00923
scoring_system epss
scoring_elements 0.75967
published_at 2026-04-04T12:55:00Z
3
value 0.00923
scoring_system epss
scoring_elements 0.75946
published_at 2026-04-07T12:55:00Z
4
value 0.00923
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-08T12:55:00Z
5
value 0.00923
scoring_system epss
scoring_elements 0.75993
published_at 2026-04-09T12:55:00Z
6
value 0.00923
scoring_system epss
scoring_elements 0.76018
published_at 2026-04-11T12:55:00Z
7
value 0.01697
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-12T12:55:00Z
8
value 0.01697
scoring_system epss
scoring_elements 0.82277
published_at 2026-04-13T12:55:00Z
9
value 0.01697
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=429149
reference_id 429149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=429149
4
reference_url https://access.redhat.com/errata/RHSA-2008:0300
reference_id RHSA-2008:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0300
fixed_packages
0
url pkg:deb/debian/glibc@2.2-1?distro=trixie
purl pkg:deb/debian/glibc@2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2008-0122
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7be7-f2ha-r7h6
21
url VCID-7czm-1nzx-nfbn
vulnerability_id VCID-7czm-1nzx-nfbn
summary
Multiple vulnerabilities have been found in the GNU C library, the
    worst allowing for remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7423
reference_id
reference_type
scores
0
value 0.04669
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-18T12:55:00Z
1
value 0.04669
scoring_system epss
scoring_elements 0.89278
published_at 2026-04-01T12:55:00Z
2
value 0.04669
scoring_system epss
scoring_elements 0.89284
published_at 2026-04-02T12:55:00Z
3
value 0.04669
scoring_system epss
scoring_elements 0.89298
published_at 2026-04-04T12:55:00Z
4
value 0.04669
scoring_system epss
scoring_elements 0.893
published_at 2026-04-07T12:55:00Z
5
value 0.04669
scoring_system epss
scoring_elements 0.89317
published_at 2026-04-08T12:55:00Z
6
value 0.04669
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-09T12:55:00Z
7
value 0.04669
scoring_system epss
scoring_elements 0.89331
published_at 2026-04-11T12:55:00Z
8
value 0.04669
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-12T12:55:00Z
9
value 0.04669
scoring_system epss
scoring_elements 0.89325
published_at 2026-04-13T12:55:00Z
10
value 0.04669
scoring_system epss
scoring_elements 0.89338
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1187109
reference_id 1187109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1187109
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722075
reference_id 722075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722075
6
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
7
reference_url https://access.redhat.com/errata/RHSA-2015:0863
reference_id RHSA-2015:0863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0863
8
reference_url https://access.redhat.com/errata/RHSA-2015:2199
reference_id RHSA-2015:2199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2199
9
reference_url https://access.redhat.com/errata/RHSA-2015:2589
reference_id RHSA-2015:2589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2589
10
reference_url https://access.redhat.com/errata/RHSA-2016:1207
reference_id RHSA-2016:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1207
11
reference_url https://usn.ubuntu.com/2519-1/
reference_id USN-2519-1
reference_type
scores
url https://usn.ubuntu.com/2519-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-1?distro=trixie
purl pkg:deb/debian/glibc@2.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-7423
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7czm-1nzx-nfbn
22
url VCID-7d3q-a8t2-s3d8
vulnerability_id VCID-7d3q-a8t2-s3d8
summary
An integer overflow in the dynamic loader, ld.so, could result in the
    execution of arbitrary code with escalated privileges.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=183844
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=183844
1
reference_url http://osvdb.org/37901
reference_id
reference_type
scores
url http://osvdb.org/37901
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3508.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3508.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3508
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15656
published_at 2026-04-18T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15772
published_at 2026-04-01T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15842
published_at 2026-04-02T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15908
published_at 2026-04-04T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15707
published_at 2026-04-07T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15793
published_at 2026-04-08T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15852
published_at 2026-04-09T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15832
published_at 2026-04-11T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15795
published_at 2026-04-12T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15725
published_at 2026-04-13T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15647
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3508
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508
5
reference_url http://secunia.com/advisories/25864
reference_id
reference_type
scores
url http://secunia.com/advisories/25864
6
reference_url http://security.gentoo.org/glsa/glsa-200707-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200707-04.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35240
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35240
8
reference_url http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup
reference_id
reference_type
scores
url http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup
9
reference_url http://www.securityfocus.com/bid/24758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24758
10
reference_url http://www.securitytracker.com/id?1018334
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018334
11
reference_url http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html
reference_id
reference_type
scores
url http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html
12
reference_url http://www.vupen.com/english/advisories/2007/2418
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2418
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=247208
reference_id 247208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=247208
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431858
reference_id 431858
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431858
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*
reference_id cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3508
reference_id CVE-2007-3508
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-3508
17
reference_url https://security.gentoo.org/glsa/200707-04
reference_id GLSA-200707-04
reference_type
scores
url https://security.gentoo.org/glsa/200707-04
fixed_packages
0
url pkg:deb/debian/glibc@2.6-2?distro=trixie
purl pkg:deb/debian/glibc@2.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.6-2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2007-3508
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d3q-a8t2-s3d8
23
url VCID-7fvy-59bc-jqf6
vulnerability_id VCID-7fvy-59bc-jqf6
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which allows context-dependent attackers to execute arbitrary
    code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
3
reference_url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1234
reference_id
reference_type
scores
0
value 0.01266
scoring_system epss
scoring_elements 0.79408
published_at 2026-04-01T12:55:00Z
1
value 0.01266
scoring_system epss
scoring_elements 0.79484
published_at 2026-04-18T12:55:00Z
2
value 0.01266
scoring_system epss
scoring_elements 0.79466
published_at 2026-04-12T12:55:00Z
3
value 0.01266
scoring_system epss
scoring_elements 0.79456
published_at 2026-04-13T12:55:00Z
4
value 0.01266
scoring_system epss
scoring_elements 0.79486
published_at 2026-04-16T12:55:00Z
5
value 0.01266
scoring_system epss
scoring_elements 0.79415
published_at 2026-04-02T12:55:00Z
6
value 0.01266
scoring_system epss
scoring_elements 0.79438
published_at 2026-04-04T12:55:00Z
7
value 0.01266
scoring_system epss
scoring_elements 0.79425
published_at 2026-04-07T12:55:00Z
8
value 0.01266
scoring_system epss
scoring_elements 0.79453
published_at 2026-04-08T12:55:00Z
9
value 0.01266
scoring_system epss
scoring_elements 0.79461
published_at 2026-04-09T12:55:00Z
10
value 0.01266
scoring_system epss
scoring_elements 0.79483
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1234
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
7
reference_url http://seclists.org/fulldisclosure/2021/Sep/0
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2021/Sep/0
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=19779
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=19779
12
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
13
reference_url http://www.openwall.com/lists/oss-security/2016/03/07/16
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/03/07/16
14
reference_url http://www.securityfocus.com/bid/84204
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84204
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1315647
reference_id 1315647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1315647
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1234
reference_id CVE-2016-1234
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1234
21
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
22
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.22-8?distro=trixie
purl pkg:deb/debian/glibc@2.22-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-1234
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fvy-59bc-jqf6
24
url VCID-7xzr-rdk3-cfhg
vulnerability_id VCID-7xzr-rdk3-cfhg
summary glibc: De-recursivise regular expression engine
references
0
reference_url http://cxib.net/stuff/proftpd.gnu.c
reference_id
reference_type
scores
url http://cxib.net/stuff/proftpd.gnu.c
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4051.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4051.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4051
reference_id
reference_type
scores
0
value 0.04658
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-18T12:55:00Z
1
value 0.04658
scoring_system epss
scoring_elements 0.89268
published_at 2026-04-01T12:55:00Z
2
value 0.04658
scoring_system epss
scoring_elements 0.89274
published_at 2026-04-02T12:55:00Z
3
value 0.04658
scoring_system epss
scoring_elements 0.89288
published_at 2026-04-04T12:55:00Z
4
value 0.04658
scoring_system epss
scoring_elements 0.89291
published_at 2026-04-07T12:55:00Z
5
value 0.04658
scoring_system epss
scoring_elements 0.89308
published_at 2026-04-08T12:55:00Z
6
value 0.04658
scoring_system epss
scoring_elements 0.89313
published_at 2026-04-09T12:55:00Z
7
value 0.04658
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-11T12:55:00Z
8
value 0.04658
scoring_system epss
scoring_elements 0.89319
published_at 2026-04-12T12:55:00Z
9
value 0.04658
scoring_system epss
scoring_elements 0.89316
published_at 2026-04-13T12:55:00Z
10
value 0.04658
scoring_system epss
scoring_elements 0.89329
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4051
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4051
4
reference_url http://seclists.org/fulldisclosure/2011/Jan/78
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2011/Jan/78
5
reference_url http://secunia.com/advisories/42547
reference_id
reference_type
scores
url http://secunia.com/advisories/42547
6
reference_url http://securityreason.com/achievement_securityalert/93
reference_id
reference_type
scores
url http://securityreason.com/achievement_securityalert/93
7
reference_url http://securitytracker.com/id?1024832
reference_id
reference_type
scores
url http://securitytracker.com/id?1024832
8
reference_url https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
9
reference_url http://www.exploit-db.com/exploits/15935
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15935
10
reference_url http://www.kb.cert.org/vuls/id/912279
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/912279
11
reference_url http://www.securityfocus.com/archive/1/515589/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515589/100/0/threaded
12
reference_url http://www.securityfocus.com/bid/45233
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45233
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645859
reference_id 645859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645859
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4051
reference_id CVE-2010-4051
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4051
43
reference_url http://securityreason.com/securityalert/8003
reference_id CVE-2010-4051;CVE-2010-4052
reference_type exploit
scores
url http://securityreason.com/securityalert/8003
44
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15935.c
reference_id CVE-2010-4051;CVE-2010-4052
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15935.c
fixed_packages
0
url pkg:deb/debian/glibc@2.19-4?distro=trixie
purl pkg:deb/debian/glibc@2.19-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2010-4051
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xzr-rdk3-cfhg
25
url VCID-814q-u5m5-gqec
vulnerability_id VCID-814q-u5m5-gqec
summary glibc: stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458)
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3706
reference_id
reference_type
scores
0
value 0.02478
scoring_system epss
scoring_elements 0.85307
published_at 2026-04-18T12:55:00Z
1
value 0.02478
scoring_system epss
scoring_elements 0.85285
published_at 2026-04-13T12:55:00Z
2
value 0.02478
scoring_system epss
scoring_elements 0.85306
published_at 2026-04-16T12:55:00Z
3
value 0.02478
scoring_system epss
scoring_elements 0.85213
published_at 2026-04-01T12:55:00Z
4
value 0.02478
scoring_system epss
scoring_elements 0.85225
published_at 2026-04-02T12:55:00Z
5
value 0.02478
scoring_system epss
scoring_elements 0.85244
published_at 2026-04-04T12:55:00Z
6
value 0.02478
scoring_system epss
scoring_elements 0.85246
published_at 2026-04-07T12:55:00Z
7
value 0.02478
scoring_system epss
scoring_elements 0.85268
published_at 2026-04-08T12:55:00Z
8
value 0.02478
scoring_system epss
scoring_elements 0.85276
published_at 2026-04-09T12:55:00Z
9
value 0.02478
scoring_system epss
scoring_elements 0.85291
published_at 2026-04-11T12:55:00Z
10
value 0.02478
scoring_system epss
scoring_elements 0.85288
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3706
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://source.android.com/security/bulletin/2017-12-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2017-12-01
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=20010
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=20010
8
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
9
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21995039
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21995039
10
reference_url http://www.securityfocus.com/bid/102073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102073
11
reference_url http://www.securityfocus.com/bid/88440
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/88440
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1330887
reference_id 1330887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1330887
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3706
reference_id CVE-2016-3706
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3706
16
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.22-8?distro=trixie
purl pkg:deb/debian/glibc@2.22-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-3706
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-814q-u5m5-gqec
26
url VCID-84zb-rzwk-fbfp
vulnerability_id VCID-84zb-rzwk-fbfp
summary glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4429
reference_id
reference_type
scores
0
value 0.01997
scoring_system epss
scoring_elements 0.8358
published_at 2026-04-01T12:55:00Z
1
value 0.01997
scoring_system epss
scoring_elements 0.83682
published_at 2026-04-18T12:55:00Z
2
value 0.01997
scoring_system epss
scoring_elements 0.83651
published_at 2026-04-12T12:55:00Z
3
value 0.01997
scoring_system epss
scoring_elements 0.83646
published_at 2026-04-13T12:55:00Z
4
value 0.01997
scoring_system epss
scoring_elements 0.83681
published_at 2026-04-16T12:55:00Z
5
value 0.01997
scoring_system epss
scoring_elements 0.83593
published_at 2026-04-02T12:55:00Z
6
value 0.01997
scoring_system epss
scoring_elements 0.83607
published_at 2026-04-04T12:55:00Z
7
value 0.01997
scoring_system epss
scoring_elements 0.83609
published_at 2026-04-07T12:55:00Z
8
value 0.01997
scoring_system epss
scoring_elements 0.83633
published_at 2026-04-08T12:55:00Z
9
value 0.01997
scoring_system epss
scoring_elements 0.83641
published_at 2026-04-09T12:55:00Z
10
value 0.01997
scoring_system epss
scoring_elements 0.83658
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
7
reference_url https://source.android.com/security/bulletin/2017-12-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2017-12-01
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=20112
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=20112
9
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
10
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
url https://www.oracle.com//security-alerts/cpujul2021.html
11
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21995039
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21995039
12
reference_url http://www.securityfocus.com/bid/102073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102073
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1337136
reference_id 1337136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1337136
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347
reference_id 840347
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4429
reference_id CVE-2016-4429
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4429
23
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
24
reference_url https://usn.ubuntu.com/3759-1/
reference_id USN-3759-1
reference_type
scores
url https://usn.ubuntu.com/3759-1/
25
reference_url https://usn.ubuntu.com/3759-2/
reference_id USN-3759-2
reference_type
scores
url https://usn.ubuntu.com/3759-2/
fixed_packages
0
url pkg:deb/debian/glibc@2.22-10?distro=trixie
purl pkg:deb/debian/glibc@2.22-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-4429
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84zb-rzwk-fbfp
27
url VCID-8egr-f63v-3uht
vulnerability_id VCID-8egr-f63v-3uht
summary glibc: Buffer overflow triggerable via LD_LIBRARY_PATH
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000409
reference_id
reference_type
scores
0
value 0.00841
scoring_system epss
scoring_elements 0.74681
published_at 2026-04-01T12:55:00Z
1
value 0.00883
scoring_system epss
scoring_elements 0.75355
published_at 2026-04-02T12:55:00Z
2
value 0.00883
scoring_system epss
scoring_elements 0.75388
published_at 2026-04-04T12:55:00Z
3
value 0.00883
scoring_system epss
scoring_elements 0.75367
published_at 2026-04-07T12:55:00Z
4
value 0.00883
scoring_system epss
scoring_elements 0.7541
published_at 2026-04-08T12:55:00Z
5
value 0.00883
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-09T12:55:00Z
6
value 0.00883
scoring_system epss
scoring_elements 0.75439
published_at 2026-04-11T12:55:00Z
7
value 0.00883
scoring_system epss
scoring_elements 0.75417
published_at 2026-04-12T12:55:00Z
8
value 0.00883
scoring_system epss
scoring_elements 0.75406
published_at 2026-04-13T12:55:00Z
9
value 0.00883
scoring_system epss
scoring_elements 0.75447
published_at 2026-04-16T12:55:00Z
10
value 0.00883
scoring_system epss
scoring_elements 0.75454
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1522830
reference_id 1522830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1522830
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133
reference_id 884133
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133
5
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.25-5?distro=trixie
purl pkg:deb/debian/glibc@2.25-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-5%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-1000409
risk_score 8.4
exploitability 2.0
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8egr-f63v-3uht
28
url VCID-8p27-z2tz-4bbm
vulnerability_id VCID-8p27-z2tz-4bbm
summary
Multiple vulnerabilities in glibc could result in Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33574
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30847
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-18T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30842
published_at 2026-04-13T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30873
published_at 2026-04-16T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30973
published_at 2026-04-02T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.3102
published_at 2026-04-04T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30838
published_at 2026-04-07T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30897
published_at 2026-04-08T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30927
published_at 2026-04-09T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30929
published_at 2026-04-11T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33574
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1965408
reference_id 1965408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1965408
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147
reference_id 989147
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147
6
reference_url https://security.archlinux.org/AVG-1621
reference_id AVG-1621
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1621
7
reference_url https://security.gentoo.org/glsa/202107-07
reference_id GLSA-202107-07
reference_type
scores
url https://security.gentoo.org/glsa/202107-07
8
reference_url https://access.redhat.com/errata/RHSA-2021:4358
reference_id RHSA-2021:4358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4358
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.32-1?distro=trixie
purl pkg:deb/debian/glibc@2.32-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.32-1%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-33574
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm
29
url VCID-991k-es3s-hbg4
vulnerability_id VCID-991k-es3s-hbg4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8121
reference_id
reference_type
scores
0
value 0.02992
scoring_system epss
scoring_elements 0.86487
published_at 2026-04-01T12:55:00Z
1
value 0.02992
scoring_system epss
scoring_elements 0.86497
published_at 2026-04-02T12:55:00Z
2
value 0.02992
scoring_system epss
scoring_elements 0.86516
published_at 2026-04-04T12:55:00Z
3
value 0.02992
scoring_system epss
scoring_elements 0.86515
published_at 2026-04-07T12:55:00Z
4
value 0.02992
scoring_system epss
scoring_elements 0.86535
published_at 2026-04-08T12:55:00Z
5
value 0.02992
scoring_system epss
scoring_elements 0.86545
published_at 2026-04-09T12:55:00Z
6
value 0.02992
scoring_system epss
scoring_elements 0.8656
published_at 2026-04-11T12:55:00Z
7
value 0.02992
scoring_system epss
scoring_elements 0.86557
published_at 2026-04-12T12:55:00Z
8
value 0.02992
scoring_system epss
scoring_elements 0.86549
published_at 2026-04-13T12:55:00Z
9
value 0.02992
scoring_system epss
scoring_elements 0.86564
published_at 2026-04-16T12:55:00Z
10
value 0.02992
scoring_system epss
scoring_elements 0.86569
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8121
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1165192
reference_id 1165192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1165192
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587
reference_id 779587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587
11
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
12
reference_url https://access.redhat.com/errata/RHSA-2015:0327
reference_id RHSA-2015:0327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0327
13
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-8121
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-991k-es3s-hbg4
30
url VCID-9nqp-tfvr-ayen
vulnerability_id VCID-9nqp-tfvr-ayen
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4806.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4806
reference_id
reference_type
scores
0
value 0.01895
scoring_system epss
scoring_elements 0.83243
published_at 2026-04-18T12:55:00Z
1
value 0.01895
scoring_system epss
scoring_elements 0.83206
published_at 2026-04-13T12:55:00Z
2
value 0.01895
scoring_system epss
scoring_elements 0.83242
published_at 2026-04-16T12:55:00Z
3
value 0.01895
scoring_system epss
scoring_elements 0.83156
published_at 2026-04-02T12:55:00Z
4
value 0.01895
scoring_system epss
scoring_elements 0.8317
published_at 2026-04-04T12:55:00Z
5
value 0.01895
scoring_system epss
scoring_elements 0.83168
published_at 2026-04-07T12:55:00Z
6
value 0.01895
scoring_system epss
scoring_elements 0.83193
published_at 2026-04-08T12:55:00Z
7
value 0.01895
scoring_system epss
scoring_elements 0.832
published_at 2026-04-09T12:55:00Z
8
value 0.01895
scoring_system epss
scoring_elements 0.83216
published_at 2026-04-11T12:55:00Z
9
value 0.01895
scoring_system epss
scoring_elements 0.8321
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237782
reference_id 2237782
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2237782
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
17
reference_url https://access.redhat.com/security/cve/CVE-2023-4806
reference_id CVE-2023-4806
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/
url https://access.redhat.com/security/cve/CVE-2023-4806
18
reference_url https://security.gentoo.org/glsa/202310-03
reference_id GLSA-202310-03
reference_type
scores
url https://security.gentoo.org/glsa/202310-03
19
reference_url https://access.redhat.com/errata/RHBA-2024:2413
reference_id RHBA-2024:2413
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/
url https://access.redhat.com/errata/RHBA-2024:2413
20
reference_url https://access.redhat.com/errata/RHSA-2023:5453
reference_id RHSA-2023:5453
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/
url https://access.redhat.com/errata/RHSA-2023:5453
21
reference_url https://access.redhat.com/errata/RHSA-2023:5455
reference_id RHSA-2023:5455
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/
url https://access.redhat.com/errata/RHSA-2023:5455
22
reference_url https://access.redhat.com/errata/RHSA-2023:7409
reference_id RHSA-2023:7409
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/
url https://access.redhat.com/errata/RHSA-2023:7409
23
reference_url https://usn.ubuntu.com/6541-1/
reference_id USN-6541-1
reference_type
scores
url https://usn.ubuntu.com/6541-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.37-10?distro=trixie
purl pkg:deb/debian/glibc@2.37-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-10%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-4806
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nqp-tfvr-ayen
31
url VCID-9tjq-wrg8-7bfw
vulnerability_id VCID-9tjq-wrg8-7bfw
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4840
reference_id
reference_type
scores
0
value 0.01592
scoring_system epss
scoring_elements 0.81592
published_at 2026-04-01T12:55:00Z
1
value 0.01592
scoring_system epss
scoring_elements 0.81603
published_at 2026-04-02T12:55:00Z
2
value 0.01592
scoring_system epss
scoring_elements 0.81624
published_at 2026-04-04T12:55:00Z
3
value 0.01592
scoring_system epss
scoring_elements 0.81622
published_at 2026-04-07T12:55:00Z
4
value 0.01592
scoring_system epss
scoring_elements 0.81649
published_at 2026-04-08T12:55:00Z
5
value 0.01592
scoring_system epss
scoring_elements 0.81654
published_at 2026-04-13T12:55:00Z
6
value 0.01592
scoring_system epss
scoring_elements 0.81674
published_at 2026-04-11T12:55:00Z
7
value 0.01592
scoring_system epss
scoring_elements 0.81661
published_at 2026-04-12T12:55:00Z
8
value 0.01592
scoring_system epss
scoring_elements 0.81693
published_at 2026-04-16T12:55:00Z
9
value 0.01592
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:deb/debian/glibc@2.7-1?distro=trixie
purl pkg:deb/debian/glibc@2.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2007-4840
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tjq-wrg8-7bfw
32
url VCID-9wwp-9dpd-s7he
vulnerability_id VCID-9wwp-9dpd-s7he
summary Kernel doesn't clear DF for signal handlers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1367
reference_id
reference_type
scores
0
value 0.03849
scoring_system epss
scoring_elements 0.88136
published_at 2026-04-01T12:55:00Z
1
value 0.03849
scoring_system epss
scoring_elements 0.88145
published_at 2026-04-02T12:55:00Z
2
value 0.03849
scoring_system epss
scoring_elements 0.88161
published_at 2026-04-04T12:55:00Z
3
value 0.03849
scoring_system epss
scoring_elements 0.88167
published_at 2026-04-07T12:55:00Z
4
value 0.03849
scoring_system epss
scoring_elements 0.88186
published_at 2026-04-08T12:55:00Z
5
value 0.03849
scoring_system epss
scoring_elements 0.88192
published_at 2026-04-09T12:55:00Z
6
value 0.03849
scoring_system epss
scoring_elements 0.88202
published_at 2026-04-11T12:55:00Z
7
value 0.04362
scoring_system epss
scoring_elements 0.8896
published_at 2026-04-12T12:55:00Z
8
value 0.04362
scoring_system epss
scoring_elements 0.88959
published_at 2026-04-13T12:55:00Z
9
value 0.04362
scoring_system epss
scoring_elements 0.88971
published_at 2026-04-16T12:55:00Z
10
value 0.04362
scoring_system epss
scoring_elements 0.8897
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=437312
reference_id 437312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=437312
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583
reference_id 465583
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583
5
reference_url https://access.redhat.com/errata/RHSA-2008:0211
reference_id RHSA-2008:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0211
6
reference_url https://access.redhat.com/errata/RHSA-2008:0233
reference_id RHSA-2008:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0233
7
reference_url https://access.redhat.com/errata/RHSA-2008:0508
reference_id RHSA-2008:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0508
fixed_packages
0
url pkg:deb/debian/glibc@2.7-8?distro=trixie
purl pkg:deb/debian/glibc@2.7-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2008-1367
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9wwp-9dpd-s7he
33
url VCID-aapy-xr76-zbc4
vulnerability_id VCID-aapy-xr76-zbc4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9402
reference_id
reference_type
scores
0
value 0.087
scoring_system epss
scoring_elements 0.92444
published_at 2026-04-01T12:55:00Z
1
value 0.087
scoring_system epss
scoring_elements 0.92451
published_at 2026-04-02T12:55:00Z
2
value 0.087
scoring_system epss
scoring_elements 0.92459
published_at 2026-04-04T12:55:00Z
3
value 0.087
scoring_system epss
scoring_elements 0.92462
published_at 2026-04-07T12:55:00Z
4
value 0.087
scoring_system epss
scoring_elements 0.92474
published_at 2026-04-08T12:55:00Z
5
value 0.087
scoring_system epss
scoring_elements 0.92479
published_at 2026-04-09T12:55:00Z
6
value 0.087
scoring_system epss
scoring_elements 0.92485
published_at 2026-04-11T12:55:00Z
7
value 0.087
scoring_system epss
scoring_elements 0.92487
published_at 2026-04-12T12:55:00Z
8
value 0.087
scoring_system epss
scoring_elements 0.92486
published_at 2026-04-13T12:55:00Z
9
value 0.087
scoring_system epss
scoring_elements 0.92496
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1175369
reference_id 1175369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1175369
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572
reference_id 775572
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572
10
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
11
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
12
reference_url https://usn.ubuntu.com/2519-1/
reference_id USN-2519-1
reference_type
scores
url https://usn.ubuntu.com/2519-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-14?distro=trixie
purl pkg:deb/debian/glibc@2.19-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-9402
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aapy-xr76-zbc4
34
url VCID-ag2y-afz2-33gu
vulnerability_id VCID-ag2y-afz2-33gu
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0028
reference_id
reference_type
scores
0
value 0.56051
scoring_system epss
scoring_elements 0.98084
published_at 2026-04-01T12:55:00Z
1
value 0.56051
scoring_system epss
scoring_elements 0.98088
published_at 2026-04-02T12:55:00Z
2
value 0.56051
scoring_system epss
scoring_elements 0.98091
published_at 2026-04-04T12:55:00Z
3
value 0.56051
scoring_system epss
scoring_elements 0.98092
published_at 2026-04-07T12:55:00Z
4
value 0.56051
scoring_system epss
scoring_elements 0.98096
published_at 2026-04-08T12:55:00Z
5
value 0.56051
scoring_system epss
scoring_elements 0.98097
published_at 2026-04-09T12:55:00Z
6
value 0.56051
scoring_system epss
scoring_elements 0.98102
published_at 2026-04-12T12:55:00Z
7
value 0.56051
scoring_system epss
scoring_elements 0.98103
published_at 2026-04-13T12:55:00Z
8
value 0.56051
scoring_system epss
scoring_elements 0.98109
published_at 2026-04-16T12:55:00Z
9
value 0.56051
scoring_system epss
scoring_elements 0.98111
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616941
reference_id 1616941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616941
4
reference_url https://access.redhat.com/errata/RHSA-2003:051
reference_id RHSA-2003:051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:051
5
reference_url https://access.redhat.com/errata/RHSA-2003:052
reference_id RHSA-2003:052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:052
6
reference_url https://access.redhat.com/errata/RHSA-2003:089
reference_id RHSA-2003:089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:089
7
reference_url https://access.redhat.com/errata/RHSA-2003:090
reference_id RHSA-2003:090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:090
8
reference_url https://access.redhat.com/errata/RHSA-2003:091
reference_id RHSA-2003:091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:091
9
reference_url https://access.redhat.com/errata/RHSA-2003:168
reference_id RHSA-2003:168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:168
10
reference_url https://access.redhat.com/errata/RHSA-2003:212
reference_id RHSA-2003:212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:212
fixed_packages
0
url pkg:deb/debian/glibc@2.3.1-16?distro=trixie
purl pkg:deb/debian/glibc@2.3.1-16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.1-16%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2003-0028
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ag2y-afz2-33gu
35
url VCID-aq6k-yr6s-4ygw
vulnerability_id VCID-aq6k-yr6s-4ygw
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1472
reference_id
reference_type
scores
0
value 0.04758
scoring_system epss
scoring_elements 0.89409
published_at 2026-04-01T12:55:00Z
1
value 0.04758
scoring_system epss
scoring_elements 0.89413
published_at 2026-04-02T12:55:00Z
2
value 0.04758
scoring_system epss
scoring_elements 0.89424
published_at 2026-04-04T12:55:00Z
3
value 0.04758
scoring_system epss
scoring_elements 0.89426
published_at 2026-04-07T12:55:00Z
4
value 0.04758
scoring_system epss
scoring_elements 0.89442
published_at 2026-04-08T12:55:00Z
5
value 0.04758
scoring_system epss
scoring_elements 0.89445
published_at 2026-04-09T12:55:00Z
6
value 0.04758
scoring_system epss
scoring_elements 0.89454
published_at 2026-04-11T12:55:00Z
7
value 0.04758
scoring_system epss
scoring_elements 0.89452
published_at 2026-04-12T12:55:00Z
8
value 0.04758
scoring_system epss
scoring_elements 0.89448
published_at 2026-04-13T12:55:00Z
9
value 0.04758
scoring_system epss
scoring_elements 0.89463
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1472
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1188235
reference_id 1188235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1188235
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197
reference_id 777197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197
10
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
11
reference_url https://access.redhat.com/errata/RHSA-2015:2199
reference_id RHSA-2015:2199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2199
12
reference_url https://access.redhat.com/errata/RHSA-2015:2589
reference_id RHSA-2015:2589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2589
13
reference_url https://usn.ubuntu.com/2519-1/
reference_id USN-2519-1
reference_type
scores
url https://usn.ubuntu.com/2519-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-15?distro=trixie
purl pkg:deb/debian/glibc@2.19-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-1472
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aq6k-yr6s-4ygw
36
url VCID-atmj-ekuz-zyg8
vulnerability_id VCID-atmj-ekuz-zyg8
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1146
reference_id
reference_type
scores
0
value 0.09717
scoring_system epss
scoring_elements 0.92909
published_at 2026-04-01T12:55:00Z
1
value 0.09717
scoring_system epss
scoring_elements 0.92917
published_at 2026-04-02T12:55:00Z
2
value 0.09717
scoring_system epss
scoring_elements 0.92921
published_at 2026-04-04T12:55:00Z
3
value 0.09717
scoring_system epss
scoring_elements 0.9292
published_at 2026-04-07T12:55:00Z
4
value 0.09717
scoring_system epss
scoring_elements 0.92928
published_at 2026-04-08T12:55:00Z
5
value 0.09717
scoring_system epss
scoring_elements 0.92933
published_at 2026-04-09T12:55:00Z
6
value 0.09717
scoring_system epss
scoring_elements 0.92938
published_at 2026-04-11T12:55:00Z
7
value 0.09717
scoring_system epss
scoring_elements 0.92936
published_at 2026-04-12T12:55:00Z
8
value 0.09717
scoring_system epss
scoring_elements 0.92937
published_at 2026-04-13T12:55:00Z
9
value 0.09717
scoring_system epss
scoring_elements 0.92947
published_at 2026-04-16T12:55:00Z
10
value 0.09717
scoring_system epss
scoring_elements 0.92949
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616843
reference_id 1616843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616843
4
reference_url https://access.redhat.com/errata/RHSA-2002:197
reference_id RHSA-2002:197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:197
5
reference_url https://access.redhat.com/errata/RHSA-2003:022
reference_id RHSA-2003:022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:022
6
reference_url https://access.redhat.com/errata/RHSA-2003:212
reference_id RHSA-2003:212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:212
fixed_packages
0
url pkg:deb/debian/glibc@2.3?distro=trixie
purl pkg:deb/debian/glibc@2.3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2002-1146
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atmj-ekuz-zyg8
37
url VCID-b6tp-a1qc-pfdw
vulnerability_id VCID-b6tp-a1qc-pfdw
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6096
reference_id
reference_type
scores
0
value 0.01904
scoring_system epss
scoring_elements 0.8318
published_at 2026-04-01T12:55:00Z
1
value 0.01904
scoring_system epss
scoring_elements 0.83283
published_at 2026-04-18T12:55:00Z
2
value 0.01904
scoring_system epss
scoring_elements 0.83196
published_at 2026-04-02T12:55:00Z
3
value 0.01904
scoring_system epss
scoring_elements 0.8321
published_at 2026-04-04T12:55:00Z
4
value 0.01904
scoring_system epss
scoring_elements 0.83208
published_at 2026-04-07T12:55:00Z
5
value 0.01904
scoring_system epss
scoring_elements 0.83233
published_at 2026-04-08T12:55:00Z
6
value 0.01904
scoring_system epss
scoring_elements 0.8324
published_at 2026-04-09T12:55:00Z
7
value 0.01904
scoring_system epss
scoring_elements 0.83256
published_at 2026-04-11T12:55:00Z
8
value 0.01904
scoring_system epss
scoring_elements 0.8325
published_at 2026-04-12T12:55:00Z
9
value 0.01904
scoring_system epss
scoring_elements 0.83245
published_at 2026-04-13T12:55:00Z
10
value 0.01904
scoring_system epss
scoring_elements 0.83282
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/
url https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
5
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=25620
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=25620
9
reference_url https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/
url https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1820331
reference_id 1820331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1820331
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452
reference_id 961452
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6096
reference_id CVE-2020-6096
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6096
17
reference_url https://security.gentoo.org/glsa/202101-20
reference_id GLSA-202101-20
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/
url https://security.gentoo.org/glsa/202101-20
18
reference_url https://usn.ubuntu.com/4954-1/
reference_id USN-4954-1
reference_type
scores
url https://usn.ubuntu.com/4954-1/
19
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-2?distro=trixie
purl pkg:deb/debian/glibc@2.31-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2020-6096
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6tp-a1qc-pfdw
38
url VCID-bcuy-bbxf-x7hy
vulnerability_id VCID-bcuy-bbxf-x7hy
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33600
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45276
published_at 2026-04-18T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.4522
published_at 2026-04-02T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45242
published_at 2026-04-04T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45185
published_at 2026-04-07T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.4524
published_at 2026-04-09T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-11T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45229
published_at 2026-04-12T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45231
published_at 2026-04-13T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45282
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277204
reference_id 2277204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277204
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
reference_id GLIBC-SA-2024-0006
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0013/
reference_id ntap-20240524-0013
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/
url https://security.netapp.com/advisory/ntap-20240524-0013/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-19?distro=trixie
purl pkg:deb/debian/glibc@2.37-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2024-33600
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy
39
url VCID-bfkj-w1s6-67bc
vulnerability_id VCID-bfkj-w1s6-67bc
summary
glibc contains an information leak vulnerability allowing the debugging of
    SUID binaries.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1453.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1453
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.2313
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23305
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23348
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23137
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.2321
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23261
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23283
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23245
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23187
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23204
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23197
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617412
reference_id 1617412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617412
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272210
reference_id 272210
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272210
5
reference_url https://security.gentoo.org/glsa/200408-16
reference_id GLSA-200408-16
reference_type
scores
url https://security.gentoo.org/glsa/200408-16
6
reference_url https://access.redhat.com/errata/RHSA-2005:256
reference_id RHSA-2005:256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:256
7
reference_url https://access.redhat.com/errata/RHSA-2005:261
reference_id RHSA-2005:261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:261
fixed_packages
0
url pkg:deb/debian/glibc@2.3.5?distro=trixie
purl pkg:deb/debian/glibc@2.3.5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.5%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2004-1453
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfkj-w1s6-67bc
40
url VCID-bsue-bznw-1ffe
vulnerability_id VCID-bsue-bznw-1ffe
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33601
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28379
published_at 2026-04-18T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28523
published_at 2026-04-02T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28566
published_at 2026-04-04T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28367
published_at 2026-04-07T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28433
published_at 2026-04-08T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28476
published_at 2026-04-09T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28479
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28436
published_at 2026-04-12T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28387
published_at 2026-04-13T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28401
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277205
reference_id 2277205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277205
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
reference_id GLIBC-SA-2024-0007
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0014/
reference_id ntap-20240524-0014
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/
url https://security.netapp.com/advisory/ntap-20240524-0014/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-19?distro=trixie
purl pkg:deb/debian/glibc@2.37-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2024-33601
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe
41
url VCID-byqx-z785-6qcq
vulnerability_id VCID-byqx-z785-6qcq
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4412
reference_id
reference_type
scores
0
value 0.18703
scoring_system epss
scoring_elements 0.95243
published_at 2026-04-01T12:55:00Z
1
value 0.18703
scoring_system epss
scoring_elements 0.95255
published_at 2026-04-02T12:55:00Z
2
value 0.18703
scoring_system epss
scoring_elements 0.95258
published_at 2026-04-04T12:55:00Z
3
value 0.18703
scoring_system epss
scoring_elements 0.95262
published_at 2026-04-07T12:55:00Z
4
value 0.18703
scoring_system epss
scoring_elements 0.9527
published_at 2026-04-08T12:55:00Z
5
value 0.18703
scoring_system epss
scoring_elements 0.95272
published_at 2026-04-09T12:55:00Z
6
value 0.18703
scoring_system epss
scoring_elements 0.95277
published_at 2026-04-11T12:55:00Z
7
value 0.18703
scoring_system epss
scoring_elements 0.95278
published_at 2026-04-12T12:55:00Z
8
value 0.18703
scoring_system epss
scoring_elements 0.95281
published_at 2026-04-13T12:55:00Z
9
value 0.18703
scoring_system epss
scoring_elements 0.95289
published_at 2026-04-16T12:55:00Z
10
value 0.18703
scoring_system epss
scoring_elements 0.95293
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530
reference_id 687530
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=855385
reference_id 855385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=855385
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c
reference_id CVE-2012-4412;OSVDB-98142
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c
6
reference_url https://www.securityfocus.com/bid/55462/info
reference_id CVE-2012-4412;OSVDB-98142
reference_type exploit
scores
url https://www.securityfocus.com/bid/55462/info
7
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
8
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.17-94?distro=trixie
purl pkg:deb/debian/glibc@2.17-94?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2012-4412
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byqx-z785-6qcq
42
url VCID-c2yx-a4d3-q7d8
vulnerability_id VCID-c2yx-a4d3-q7d8
summary
Multiple vulnerabilities were found in glibc, the worst of which allowing
    local attackers to execute arbitrary code as root.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4880.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4880
reference_id
reference_type
scores
0
value 0.12962
scoring_system epss
scoring_elements 0.94092
published_at 2026-04-18T12:55:00Z
1
value 0.12962
scoring_system epss
scoring_elements 0.9403
published_at 2026-04-01T12:55:00Z
2
value 0.12962
scoring_system epss
scoring_elements 0.9404
published_at 2026-04-02T12:55:00Z
3
value 0.12962
scoring_system epss
scoring_elements 0.94051
published_at 2026-04-04T12:55:00Z
4
value 0.12962
scoring_system epss
scoring_elements 0.94054
published_at 2026-04-07T12:55:00Z
5
value 0.12962
scoring_system epss
scoring_elements 0.94062
published_at 2026-04-08T12:55:00Z
6
value 0.12962
scoring_system epss
scoring_elements 0.94066
published_at 2026-04-09T12:55:00Z
7
value 0.12962
scoring_system epss
scoring_elements 0.94071
published_at 2026-04-13T12:55:00Z
8
value 0.12962
scoring_system epss
scoring_elements 0.94087
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4880
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880
3
reference_url http://secunia.com/advisories/39900
reference_id
reference_type
scores
url http://secunia.com/advisories/39900
4
reference_url http://security.gentoo.org/glsa/glsa-201011-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201011-01.xml
5
reference_url http://securityreason.com/achievement_securityalert/67
reference_id
reference_type
scores
url http://securityreason.com/achievement_securityalert/67
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/59242
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/59242
7
reference_url http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600
reference_id
reference_type
scores
url http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600
8
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=199eb0de8d673fb23aa127721054b4f1803d61f3
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=199eb0de8d673fb23aa127721054b4f1803d61f3
9
reference_url http://www.debian.org/security/2010/dsa-2058
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2058
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:112
12
reference_url http://www.securityfocus.com/bid/36443
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/36443
13
reference_url http://www.ubuntu.com/usn/USN-944-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-944-1
14
reference_url http://www.vupen.com/english/advisories/2010/1246
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1246
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=599070
reference_id 599070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=599070
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-4880
reference_id CVE-2009-4880
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-4880
54
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33230.txt
reference_id CVE-2009-4880;OSVDB-65080
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33230.txt
55
reference_url https://www.securityfocus.com/bid/36443/info
reference_id CVE-2009-4880;OSVDB-65080
reference_type exploit
scores
url https://www.securityfocus.com/bid/36443/info
56
reference_url https://security.gentoo.org/glsa/201011-01
reference_id GLSA-201011-01
reference_type
scores
url https://security.gentoo.org/glsa/201011-01
fixed_packages
0
url pkg:deb/debian/glibc@2.11.1-1?distro=trixie
purl pkg:deb/debian/glibc@2.11.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.1-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2009-4880
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2yx-a4d3-q7d8
43
url VCID-c4w6-89qu-xkev
vulnerability_id VCID-c4w6-89qu-xkev
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7309
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37601
published_at 2026-04-01T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37738
published_at 2026-04-08T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37783
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37809
published_at 2026-04-04T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37687
published_at 2026-04-07T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.3775
published_at 2026-04-09T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37765
published_at 2026-04-11T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-16T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.44351
published_at 2026-04-18T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44304
published_at 2026-04-12T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44303
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24155
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24155
4
reference_url https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
reference_id
reference_type
scores
url https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
5
reference_url http://www.securityfocus.com/bid/106835
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106835
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672232
reference_id 1672232
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672232
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7309
reference_id CVE-2019-7309
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7309
9
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
fixed_packages
0
url pkg:deb/debian/glibc@2.28-6?distro=trixie
purl pkg:deb/debian/glibc@2.28-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-6%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2019-7309
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4w6-89qu-xkev
44
url VCID-cktt-pktd-ffat
vulnerability_id VCID-cktt-pktd-ffat
summary
Multiple vulnerabilities were found in glibc, the worst of which allowing
    local attackers to execute arbitrary code as root.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3847.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3847.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3847
reference_id
reference_type
scores
0
value 0.04983
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-01T12:55:00Z
1
value 0.11264
scoring_system epss
scoring_elements 0.93491
published_at 2026-04-02T12:55:00Z
2
value 0.11264
scoring_system epss
scoring_elements 0.93499
published_at 2026-04-07T12:55:00Z
3
value 0.11264
scoring_system epss
scoring_elements 0.93506
published_at 2026-04-08T12:55:00Z
4
value 0.11264
scoring_system epss
scoring_elements 0.93509
published_at 2026-04-09T12:55:00Z
5
value 0.11264
scoring_system epss
scoring_elements 0.93515
published_at 2026-04-13T12:55:00Z
6
value 0.11264
scoring_system epss
scoring_elements 0.93514
published_at 2026-04-12T12:55:00Z
7
value 0.11264
scoring_system epss
scoring_elements 0.93534
published_at 2026-04-16T12:55:00Z
8
value 0.11264
scoring_system epss
scoring_elements 0.9354
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3847
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847
3
reference_url http://seclists.org/fulldisclosure/2010/Oct/257
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2010/Oct/257
4
reference_url http://seclists.org/fulldisclosure/2010/Oct/292
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2010/Oct/292
5
reference_url http://seclists.org/fulldisclosure/2010/Oct/294
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2010/Oct/294
6
reference_url http://secunia.com/advisories/42787
reference_id
reference_type
scores
url http://secunia.com/advisories/42787
7
reference_url http://security.gentoo.org/glsa/glsa-201011-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201011-01.xml
8
reference_url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
reference_id
reference_type
scores
url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
9
reference_url http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html
reference_id
reference_type
scores
url http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html
10
reference_url https://rhn.redhat.com/errata/RHSA-2010-0787.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0787.html
11
reference_url http://support.avaya.com/css/P8/documents/100120941
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100120941
12
reference_url https://www.exploit-db.com/exploits/44024/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44024/
13
reference_url https://www.exploit-db.com/exploits/44025/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44025/
14
reference_url http://www.debian.org/security/2010/dsa-2122
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2122
15
reference_url http://www.kb.cert.org/vuls/id/537223
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/537223
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:207
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:207
17
reference_url http://www.redhat.com/support/errata/RHSA-2010-0872.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0872.html
18
reference_url http://www.securityfocus.com/archive/1/515545/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515545/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/44154
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44154
20
reference_url http://www.ubuntu.com/usn/USN-1009-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1009-1
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
22
reference_url http://www.vupen.com/english/advisories/2011/0025
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0025
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=643306
reference_id 643306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=643306
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
79
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44024.rb
reference_id CVE-2010-3847
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44024.rb
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3847
reference_id CVE-2010-3847
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3847
81
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/add7ae8fa18f689ff7e41057bc5bd51fdc8eaa5e/modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb
reference_id CVE-2010-3847
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/add7ae8fa18f689ff7e41057bc5bd51fdc8eaa5e/modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb
82
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44025.rb
reference_id CVE-2010-3856;CVE-2010-3847
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44025.rb
83
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/cb1b59545b1378be9e781787b028fee03d734f58/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb
reference_id CVE-2010-3856;CVE-2010-3847
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/cb1b59545b1378be9e781787b028fee03d734f58/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb
84
reference_url http://marc.info/?l=full-disclosure&m=128776663124692&w=2
reference_id CVE-2010-3856;OSVDB-68920;CVE-2010-3847
reference_type exploit
scores
url http://marc.info/?l=full-disclosure&m=128776663124692&w=2
85
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15304.txt
reference_id CVE-2010-3856;OSVDB-68920;CVE-2010-3847
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15304.txt
86
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15274.txt
reference_id CVE-2011-0536;OSVDB-68721;CVE-2010-3847
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15274.txt
87
reference_url https://security.gentoo.org/glsa/201011-01
reference_id GLSA-201011-01
reference_type
scores
url https://security.gentoo.org/glsa/201011-01
88
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
89
reference_url https://access.redhat.com/errata/RHSA-2010:0787
reference_id RHSA-2010:0787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0787
90
reference_url https://access.redhat.com/errata/RHSA-2010:0872
reference_id RHSA-2010:0872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0872
91
reference_url https://usn.ubuntu.com/1009-1/
reference_id USN-1009-1
reference_type
scores
url https://usn.ubuntu.com/1009-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.11.2-8?distro=trixie
purl pkg:deb/debian/glibc@2.11.2-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.2-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2010-3847
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cktt-pktd-ffat
45
url VCID-cs4a-sme5-7yha
vulnerability_id VCID-cs4a-sme5-7yha
summary
Multiple vulnerabilities have been found in GNU C Library, the
    worst of which allowing arbitrary code execution and privilege escalation.
references
0
reference_url http://lists.debian.org/debian-security-announce/2011/msg00005.html
reference_id
reference_type
scores
url http://lists.debian.org/debian-security-announce/2011/msg00005.html
1
reference_url http://openwall.com/lists/oss-security/2011/02/01/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/01/3
2
reference_url http://openwall.com/lists/oss-security/2011/02/03/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/03/2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0536.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0536.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0536
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51631
published_at 2026-04-18T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.5148
published_at 2026-04-01T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51532
published_at 2026-04-02T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51559
published_at 2026-04-04T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51519
published_at 2026-04-07T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51573
published_at 2026-04-08T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.5157
published_at 2026-04-09T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.5162
published_at 2026-04-11T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51599
published_at 2026-04-12T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51582
published_at 2026-04-13T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51624
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0536
5
reference_url http://secunia.com/advisories/43830
reference_id
reference_type
scores
url http://secunia.com/advisories/43830
6
reference_url http://secunia.com/advisories/43989
reference_id
reference_type
scores
url http://secunia.com/advisories/43989
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://securitytracker.com/id?1025289
reference_id
reference_type
scores
url http://securitytracker.com/id?1025289
9
reference_url https://launchpad.net/bugs/701783
reference_id
reference_type
scores
url https://launchpad.net/bugs/701783
10
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=96611391ad8823ba58405325d78cefeae5cdf699
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=96611391ad8823ba58405325d78cefeae5cdf699
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13086
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13086
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0412.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0412.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0413.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0413.html
15
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
16
reference_url http://www.ubuntu.com/usn/USN-1009-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1009-2
17
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
18
reference_url http://www.vupen.com/english/advisories/2011/0863
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0863
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667974
reference_id 667974
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667974
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0536
reference_id CVE-2011-0536
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0536
24
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
25
reference_url https://access.redhat.com/errata/RHSA-2011:0412
reference_id RHSA-2011:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0412
26
reference_url https://access.redhat.com/errata/RHSA-2011:0413
reference_id RHSA-2011:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0413
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2011-0536
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cs4a-sme5-7yha
46
url VCID-cv87-rxmr-cqhn
vulnerability_id VCID-cv87-rxmr-cqhn
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15671
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45952
published_at 2026-04-18T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45852
published_at 2026-04-07T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45908
published_at 2026-04-08T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45905
published_at 2026-04-13T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45928
published_at 2026-04-11T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45898
published_at 2026-04-12T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.45957
published_at 2026-04-16T12:55:00Z
7
value 0.00403
scoring_system epss
scoring_elements 0.60839
published_at 2026-04-04T12:55:00Z
8
value 0.00403
scoring_system epss
scoring_elements 0.60737
published_at 2026-04-01T12:55:00Z
9
value 0.00403
scoring_system epss
scoring_elements 0.6081
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22325
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22325
5
reference_url http://www.securityfocus.com/bid/101517
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101517
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1504806
reference_id 1504806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1504806
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500
reference_id 879500
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500
8
reference_url https://security.archlinux.org/ASA-201801-8
reference_id ASA-201801-8
reference_type
scores
url https://security.archlinux.org/ASA-201801-8
9
reference_url https://security.archlinux.org/ASA-201801-9
reference_id ASA-201801-9
reference_type
scores
url https://security.archlinux.org/ASA-201801-9
10
reference_url https://security.archlinux.org/AVG-460
reference_id AVG-460
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-460
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15671
reference_id CVE-2017-15671
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15671
13
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
fixed_packages
0
url pkg:deb/debian/glibc@2.25-3?distro=trixie
purl pkg:deb/debian/glibc@2.25-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-15671
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cv87-rxmr-cqhn
47
url VCID-d1zs-8tg7-byhe
vulnerability_id VCID-d1zs-8tg7-byhe
summary security update
references
0
reference_url http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
reference_id
reference_type
scores
url http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8777
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18743
published_at 2026-04-01T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18654
published_at 2026-04-07T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18791
published_at 2026-04-11T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18745
published_at 2026-04-12T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18695
published_at 2026-04-13T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18644
published_at 2026-04-16T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18879
published_at 2026-04-02T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18932
published_at 2026-04-04T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18733
published_at 2026-04-08T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18787
published_at 2026-04-09T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21072
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8777
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18928
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=18928
17
reference_url http://www.debian.org/security/2016/dsa-3480
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3480
18
reference_url http://www.openwall.com/lists/oss-security/2016/01/20/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/20/1
19
reference_url http://www.securityfocus.com/bid/81469
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81469
20
reference_url http://www.securitytracker.com/id/1034811
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034811
21
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
22
reference_url http://www.ubuntu.com/usn/USN-2985-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-2
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1260581
reference_id 1260581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1260581
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316
reference_id 798316
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8777
reference_id CVE-2015-8777
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-8777
27
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
28
reference_url https://access.redhat.com/errata/RHSA-2017:1916
reference_id RHSA-2017:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1916
29
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8777
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1zs-8tg7-byhe
48
url VCID-d5xx-af6p-2fhn
vulnerability_id VCID-d5xx-af6p-2fhn
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4802
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13253
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13033
published_at 2026-04-18T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13249
published_at 2026-04-09T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13218
published_at 2026-04-11T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13181
published_at 2026-04-12T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13129
published_at 2026-04-13T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13031
published_at 2026-04-16T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13319
published_at 2026-04-04T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13117
published_at 2026-04-07T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13198
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367468
reference_id 2367468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2367468
5
reference_url https://security.gentoo.org/glsa/202509-04
reference_id GLSA-202509-04
reference_type
scores
url https://security.gentoo.org/glsa/202509-04
6
reference_url https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
reference_id ?id=1e18586c5820e329f741d5c710275e165581380e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/
url https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
7
reference_url https://access.redhat.com/errata/RHSA-2025:10219
reference_id RHSA-2025:10219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10219
8
reference_url https://access.redhat.com/errata/RHSA-2025:10220
reference_id RHSA-2025:10220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10220
9
reference_url https://access.redhat.com/errata/RHSA-2025:10294
reference_id RHSA-2025:10294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10294
10
reference_url https://access.redhat.com/errata/RHSA-2025:11487
reference_id RHSA-2025:11487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11487
11
reference_url https://access.redhat.com/errata/RHSA-2025:8655
reference_id RHSA-2025:8655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8655
12
reference_url https://access.redhat.com/errata/RHSA-2025:8686
reference_id RHSA-2025:8686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8686
13
reference_url https://access.redhat.com/errata/RHSA-2025:9028
reference_id RHSA-2025:9028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9028
14
reference_url https://access.redhat.com/errata/RHSA-2025:9336
reference_id RHSA-2025:9336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9336
15
reference_url https://access.redhat.com/errata/RHSA-2025:9725
reference_id RHSA-2025:9725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9725
16
reference_url https://access.redhat.com/errata/RHSA-2025:9750
reference_id RHSA-2025:9750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9750
17
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32976
reference_id show_bug.cgi?id=32976
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32976
18
reference_url https://usn.ubuntu.com/7541-1/
reference_id USN-7541-1
reference_type
scores
url https://usn.ubuntu.com/7541-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.39-4?distro=trixie
purl pkg:deb/debian/glibc@2.39-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.39-4%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2025-4802
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn
49
url VCID-dgmx-612a-eqfq
vulnerability_id VCID-dgmx-612a-eqfq
summary Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38604.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38604
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28049
published_at 2026-04-01T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.27968
published_at 2026-04-18T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.27985
published_at 2026-04-16T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28121
published_at 2026-04-02T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.27977
published_at 2026-04-13T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28034
published_at 2026-04-12T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28077
published_at 2026-04-11T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.2807
published_at 2026-04-09T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28028
published_at 2026-04-08T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28164
published_at 2026-04-04T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.2796
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38604
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1993517
reference_id 1993517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1993517
4
reference_url https://security.archlinux.org/AVG-2293
reference_id AVG-2293
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2293
5
reference_url https://security.gentoo.org/glsa/202208-24
reference_id GLSA-202208-24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/
url https://security.gentoo.org/glsa/202208-24
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
reference_id GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
7
reference_url https://security.netapp.com/advisory/ntap-20210909-0005/
reference_id ntap-20210909-0005
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/
url https://security.netapp.com/advisory/ntap-20210909-0005/
8
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641
reference_id ?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641
9
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8
reference_id ?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=28213
reference_id show_bug.cgi?id=28213
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=28213
11
reference_url https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
reference_id tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/
url https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-38604
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgmx-612a-eqfq
50
url VCID-dqgn-fdxt-u3cc
vulnerability_id VCID-dqgn-fdxt-u3cc
summary
Multiple vulnerabilities in glibc could result in Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3326
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38548
published_at 2026-04-16T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38471
published_at 2026-04-01T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.38631
published_at 2026-04-04T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38545
published_at 2026-04-08T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38494
published_at 2026-04-07T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38607
published_at 2026-04-02T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.38501
published_at 2026-04-13T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38527
published_at 2026-04-18T12:55:00Z
8
value 0.00172
scoring_system epss
scoring_elements 0.38565
published_at 2026-04-11T12:55:00Z
9
value 0.00172
scoring_system epss
scoring_elements 0.38554
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3326
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1921916
reference_id 1921916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1921916
5
reference_url http://www.openwall.com/lists/oss-security/2021/01/28/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/
url http://www.openwall.com/lists/oss-security/2021/01/28/2
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198
reference_id 981198
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198
7
reference_url https://security.archlinux.org/ASA-202102-16
reference_id ASA-202102-16
reference_type
scores
url https://security.archlinux.org/ASA-202102-16
8
reference_url https://security.archlinux.org/ASA-202102-17
reference_id ASA-202102-17
reference_type
scores
url https://security.archlinux.org/ASA-202102-17
9
reference_url https://security.archlinux.org/AVG-1320
reference_id AVG-1320
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1320
10
reference_url https://security.gentoo.org/glsa/202107-07
reference_id GLSA-202107-07
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/
url https://security.gentoo.org/glsa/202107-07
11
reference_url https://security.netapp.com/advisory/ntap-20210304-0007/
reference_id ntap-20210304-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/
url https://security.netapp.com/advisory/ntap-20210304-0007/
12
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888
reference_id ?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888
13
reference_url https://access.redhat.com/errata/RHSA-2021:1585
reference_id RHSA-2021:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1585
14
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=27256
reference_id show_bug.cgi?id=27256
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=27256
15
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
16
reference_url https://usn.ubuntu.com/5699-1/
reference_id USN-5699-1
reference_type
scores
url https://usn.ubuntu.com/5699-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-10?distro=trixie
purl pkg:deb/debian/glibc@2.31-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-3326
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqgn-fdxt-u3cc
51
url VCID-duv1-qtpd-ybdg
vulnerability_id VCID-duv1-qtpd-ybdg
summary glibc: vDSO getrandom acceleration may return predictable randomness
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0577.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0577
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01451
published_at 2026-04-18T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01436
published_at 2026-04-16T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03365
published_at 2026-04-11T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03336
published_at 2026-04-12T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03313
published_at 2026-04-13T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03586
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.0354
published_at 2026-04-02T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03563
published_at 2026-04-07T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03564
published_at 2026-04-08T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03554
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0577
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2338871
reference_id 2338871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2338871
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2025-0577
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duv1-qtpd-ybdg
52
url VCID-e27x-ufvw-cyec
vulnerability_id VCID-e27x-ufvw-cyec
summary glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11236
reference_id
reference_type
scores
0
value 0.00965
scoring_system epss
scoring_elements 0.76503
published_at 2026-04-01T12:55:00Z
1
value 0.00965
scoring_system epss
scoring_elements 0.76607
published_at 2026-04-18T12:55:00Z
2
value 0.00965
scoring_system epss
scoring_elements 0.76568
published_at 2026-04-12T12:55:00Z
3
value 0.00965
scoring_system epss
scoring_elements 0.76561
published_at 2026-04-13T12:55:00Z
4
value 0.00965
scoring_system epss
scoring_elements 0.76603
published_at 2026-04-16T12:55:00Z
5
value 0.00965
scoring_system epss
scoring_elements 0.76508
published_at 2026-04-02T12:55:00Z
6
value 0.00965
scoring_system epss
scoring_elements 0.76537
published_at 2026-04-04T12:55:00Z
7
value 0.00965
scoring_system epss
scoring_elements 0.7652
published_at 2026-04-07T12:55:00Z
8
value 0.00965
scoring_system epss
scoring_elements 0.76552
published_at 2026-04-08T12:55:00Z
9
value 0.00965
scoring_system epss
scoring_elements 0.76563
published_at 2026-04-09T12:55:00Z
10
value 0.00965
scoring_system epss
scoring_elements 0.76589
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11236
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.netapp.com/advisory/ntap-20190329-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190329-0001/
6
reference_url https://security.netapp.com/advisory/ntap-20190401-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190401-0001/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22786
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22786
8
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.securityfocus.com/bid/104255
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104255
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581269
reference_id 1581269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581269
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071
reference_id 899071
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11236
reference_id CVE-2018-11236
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11236
26
reference_url https://access.redhat.com/errata/RHSA-2018:3092
reference_id RHSA-2018:3092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3092
27
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
28
reference_url https://usn.ubuntu.com/6762-1/
reference_id USN-6762-1
reference_type
scores
url https://usn.ubuntu.com/6762-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.27-4?distro=trixie
purl pkg:deb/debian/glibc@2.27-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2018-11236
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e27x-ufvw-cyec
53
url VCID-e6xr-13c6-7uf9
vulnerability_id VCID-e6xr-13c6-7uf9
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0689
reference_id
reference_type
scores
0
value 0.00891
scoring_system epss
scoring_elements 0.75473
published_at 2026-04-01T12:55:00Z
1
value 0.00891
scoring_system epss
scoring_elements 0.75476
published_at 2026-04-02T12:55:00Z
2
value 0.00891
scoring_system epss
scoring_elements 0.75507
published_at 2026-04-04T12:55:00Z
3
value 0.00891
scoring_system epss
scoring_elements 0.75487
published_at 2026-04-07T12:55:00Z
4
value 0.00891
scoring_system epss
scoring_elements 0.75529
published_at 2026-04-08T12:55:00Z
5
value 0.00891
scoring_system epss
scoring_elements 0.75538
published_at 2026-04-12T12:55:00Z
6
value 0.00891
scoring_system epss
scoring_elements 0.75559
published_at 2026-04-11T12:55:00Z
7
value 0.00891
scoring_system epss
scoring_elements 0.75528
published_at 2026-04-13T12:55:00Z
8
value 0.00891
scoring_system epss
scoring_elements 0.75571
published_at 2026-04-16T12:55:00Z
9
value 0.00891
scoring_system epss
scoring_elements 0.75577
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0689
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617066
reference_id 1617066
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617066
4
reference_url https://access.redhat.com/errata/RHSA-2003:249
reference_id RHSA-2003:249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:249
5
reference_url https://access.redhat.com/errata/RHSA-2003:325
reference_id RHSA-2003:325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:325
fixed_packages
0
url pkg:deb/debian/glibc@2.2.5?distro=trixie
purl pkg:deb/debian/glibc@2.2.5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2003-0689
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6xr-13c6-7uf9
54
url VCID-e9fg-s2r5-qfc2
vulnerability_id VCID-e9fg-s2r5-qfc2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6656
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-16T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-01T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78936
published_at 2026-04-02T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78964
published_at 2026-04-04T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-07T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-08T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.78978
published_at 2026-04-09T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-18T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78987
published_at 2026-04-12T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6656
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=14134
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=14134
7
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5
reference_id
reference_type
scores
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5
8
reference_url http://www.debian.org/security/2015/dsa-3142
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3142
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
10
reference_url http://www.openwall.com/lists/oss-security/2014/08/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/08/29/3
11
reference_url http://www.openwall.com/lists/oss-security/2014/09/02/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/02/1
12
reference_url http://www.securityfocus.com/bid/69472
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69472
13
reference_url http://www.ubuntu.com/usn/USN-2432-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2432-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135840
reference_id 1135840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135840
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6656
reference_id CVE-2012-6656
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6656
22
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
23
reference_url https://usn.ubuntu.com/2432-1/
reference_id USN-2432-1
reference_type
scores
url https://usn.ubuntu.com/2432-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.17-1?distro=trixie
purl pkg:deb/debian/glibc@2.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2012-6656
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2
55
url VCID-edpa-k13r-uken
vulnerability_id VCID-edpa-k13r-uken
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6323
reference_id
reference_type
scores
0
value 0.01133
scoring_system epss
scoring_elements 0.78293
published_at 2026-04-01T12:55:00Z
1
value 0.01133
scoring_system epss
scoring_elements 0.783
published_at 2026-04-02T12:55:00Z
2
value 0.01133
scoring_system epss
scoring_elements 0.7833
published_at 2026-04-04T12:55:00Z
3
value 0.01133
scoring_system epss
scoring_elements 0.78313
published_at 2026-04-07T12:55:00Z
4
value 0.01133
scoring_system epss
scoring_elements 0.78339
published_at 2026-04-08T12:55:00Z
5
value 0.01133
scoring_system epss
scoring_elements 0.78345
published_at 2026-04-09T12:55:00Z
6
value 0.01133
scoring_system epss
scoring_elements 0.78371
published_at 2026-04-11T12:55:00Z
7
value 0.01133
scoring_system epss
scoring_elements 0.78354
published_at 2026-04-12T12:55:00Z
8
value 0.01133
scoring_system epss
scoring_elements 0.78347
published_at 2026-04-13T12:55:00Z
9
value 0.01133
scoring_system epss
scoring_elements 0.78376
published_at 2026-04-16T12:55:00Z
10
value 0.01133
scoring_system epss
scoring_elements 0.78375
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6323
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1383297
reference_id 1383297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1383297
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752
reference_id 834752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752
6
reference_url https://security.gentoo.org/glsa/201706-19
reference_id GLSA-201706-19
reference_type
scores
url https://security.gentoo.org/glsa/201706-19
7
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.24-1?distro=trixie
purl pkg:deb/debian/glibc@2.24-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-6323
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edpa-k13r-uken
56
url VCID-et4n-9tuq-k3ct
vulnerability_id VCID-et4n-9tuq-k3ct
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6246.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6246.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6246
reference_id
reference_type
scores
0
value 0.25481
scoring_system epss
scoring_elements 0.96233
published_at 2026-04-18T12:55:00Z
1
value 0.25481
scoring_system epss
scoring_elements 0.96219
published_at 2026-04-12T12:55:00Z
2
value 0.25481
scoring_system epss
scoring_elements 0.96221
published_at 2026-04-13T12:55:00Z
3
value 0.25481
scoring_system epss
scoring_elements 0.96229
published_at 2026-04-16T12:55:00Z
4
value 0.26964
scoring_system epss
scoring_elements 0.96344
published_at 2026-04-04T12:55:00Z
5
value 0.26964
scoring_system epss
scoring_elements 0.9634
published_at 2026-04-02T12:55:00Z
6
value 0.26964
scoring_system epss
scoring_elements 0.9636
published_at 2026-04-09T12:55:00Z
7
value 0.26964
scoring_system epss
scoring_elements 0.96356
published_at 2026-04-08T12:55:00Z
8
value 0.26964
scoring_system epss
scoring_elements 0.96348
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6246
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2249053
reference_id 2249053
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2249053
4
reference_url http://seclists.org/fulldisclosure/2024/Feb/3
reference_id 3
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url http://seclists.org/fulldisclosure/2024/Feb/3
5
reference_url http://seclists.org/fulldisclosure/2024/Feb/5
reference_id 5
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url http://seclists.org/fulldisclosure/2024/Feb/5
6
reference_url https://www.openwall.com/lists/oss-security/2024/01/30/6
reference_id 6
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://www.openwall.com/lists/oss-security/2024/01/30/6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2023-6246
reference_id CVE-2023-6246
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://access.redhat.com/security/cve/CVE-2023-6246
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
reference_id D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
13
reference_url http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html
reference_id glibc-qsort-Out-Of-Bounds-Read-Write.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html
14
reference_url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_id glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
15
reference_url https://security.gentoo.org/glsa/202402-01
reference_id GLSA-202402-01
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://security.gentoo.org/glsa/202402-01
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
reference_id MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
17
reference_url https://security.netapp.com/advisory/ntap-20240216-0007/
reference_id ntap-20240216-0007
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://security.netapp.com/advisory/ntap-20240216-0007/
18
reference_url https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
reference_id syslog.txt
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/
url https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
19
reference_url https://usn.ubuntu.com/6620-1/
reference_id USN-6620-1
reference_type
scores
url https://usn.ubuntu.com/6620-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-15?distro=trixie
purl pkg:deb/debian/glibc@2.37-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-15%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-6246
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-et4n-9tuq-k3ct
57
url VCID-evbv-ckb4-yybq
vulnerability_id VCID-evbv-ckb4-yybq
summary glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result
references
0
reference_url http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5155
reference_id
reference_type
scores
0
value 0.01348
scoring_system epss
scoring_elements 0.80034
published_at 2026-04-01T12:55:00Z
1
value 0.01348
scoring_system epss
scoring_elements 0.80112
published_at 2026-04-18T12:55:00Z
2
value 0.01348
scoring_system epss
scoring_elements 0.80091
published_at 2026-04-12T12:55:00Z
3
value 0.01348
scoring_system epss
scoring_elements 0.80083
published_at 2026-04-13T12:55:00Z
4
value 0.01348
scoring_system epss
scoring_elements 0.80111
published_at 2026-04-16T12:55:00Z
5
value 0.01348
scoring_system epss
scoring_elements 0.80041
published_at 2026-04-02T12:55:00Z
6
value 0.01348
scoring_system epss
scoring_elements 0.80062
published_at 2026-04-04T12:55:00Z
7
value 0.01348
scoring_system epss
scoring_elements 0.80051
published_at 2026-04-07T12:55:00Z
8
value 0.01348
scoring_system epss
scoring_elements 0.80079
published_at 2026-04-08T12:55:00Z
9
value 0.01348
scoring_system epss
scoring_elements 0.80087
published_at 2026-04-09T12:55:00Z
10
value 0.01348
scoring_system epss
scoring_elements 0.80107
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5155
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
4
reference_url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
reference_id
reference_type
scores
url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
5
reference_url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
reference_id
reference_type
scores
url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
6
reference_url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
reference_id
reference_type
scores
url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
10
reference_url https://security.netapp.com/advisory/ntap-20190315-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0002/
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=11053
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=11053
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18986
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=18986
13
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
14
reference_url https://support.f5.com/csp/article/K64119434
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K64119434
15
reference_url https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp%3Butm_medium=RSS
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1683683
reference_id 1683683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1683683
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613
reference_id 924613
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-5155
reference_id CVE-2009-5155
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2009-5155
23
reference_url https://usn.ubuntu.com/4954-1/
reference_id USN-4954-1
reference_type
scores
url https://usn.ubuntu.com/4954-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.28-1?distro=trixie
purl pkg:deb/debian/glibc@2.28-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2009-5155
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-evbv-ckb4-yybq
58
url VCID-f7mh-4xkf-7fha
vulnerability_id VCID-f7mh-4xkf-7fha
summary
Multiple vulnerabilities were found in glibc, the worst of which allowing
    local attackers to execute arbitrary code as root.
references
0
reference_url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
1
reference_url http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3856.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3856.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3856
reference_id
reference_type
scores
0
value 0.05279
scoring_system epss
scoring_elements 0.89962
published_at 2026-04-01T12:55:00Z
1
value 0.0894
scoring_system epss
scoring_elements 0.9256
published_at 2026-04-02T12:55:00Z
2
value 0.0894
scoring_system epss
scoring_elements 0.92567
published_at 2026-04-04T12:55:00Z
3
value 0.0894
scoring_system epss
scoring_elements 0.92569
published_at 2026-04-07T12:55:00Z
4
value 0.0894
scoring_system epss
scoring_elements 0.9258
published_at 2026-04-08T12:55:00Z
5
value 0.0894
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-09T12:55:00Z
6
value 0.0894
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-12T12:55:00Z
7
value 0.0894
scoring_system epss
scoring_elements 0.9259
published_at 2026-04-13T12:55:00Z
8
value 0.0894
scoring_system epss
scoring_elements 0.92604
published_at 2026-04-16T12:55:00Z
9
value 0.0894
scoring_system epss
scoring_elements 0.92603
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856
5
reference_url http://seclists.org/fulldisclosure/2010/Oct/344
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2010/Oct/344
6
reference_url http://seclists.org/fulldisclosure/2019/Jun/18
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jun/18
7
reference_url http://seclists.org/fulldisclosure/2023/Jul/31
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2023/Jul/31
8
reference_url http://secunia.com/advisories/42787
reference_id
reference_type
scores
url http://secunia.com/advisories/42787
9
reference_url http://security.gentoo.org/glsa/glsa-201011-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201011-01.xml
10
reference_url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
reference_id
reference_type
scores
url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
11
reference_url http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html
reference_id
reference_type
scores
url http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html
12
reference_url https://rhn.redhat.com/errata/RHSA-2010-0793.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0793.html
13
reference_url https://seclists.org/bugtraq/2019/Jun/14
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jun/14
14
reference_url http://support.avaya.com/css/P8/documents/100121017
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100121017
15
reference_url https://www.exploit-db.com/exploits/44025/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44025/
16
reference_url http://www.debian.org/security/2010/dsa-2122
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2122
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:212
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:212
18
reference_url http://www.openwall.com/lists/oss-security/2023/07/19/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2023/07/19/9
19
reference_url http://www.openwall.com/lists/oss-security/2023/07/20/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2023/07/20/1
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0872.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0872.html
21
reference_url http://www.securityfocus.com/archive/1/515545/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515545/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/44347
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44347
23
reference_url http://www.ubuntu.com/usn/USN-1009-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1009-1
24
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
25
reference_url http://www.vupen.com/english/advisories/2011/0025
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0025
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645672
reference_id 645672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645672
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3856
reference_id CVE-2010-3856
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3856
83
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18105.sh
reference_id CVE-2010-3856;OSVDB-68920
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18105.sh
84
reference_url https://security.gentoo.org/glsa/201011-01
reference_id GLSA-201011-01
reference_type
scores
url https://security.gentoo.org/glsa/201011-01
85
reference_url https://access.redhat.com/errata/RHSA-2010:0793
reference_id RHSA-2010:0793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0793
86
reference_url https://access.redhat.com/errata/RHSA-2010:0872
reference_id RHSA-2010:0872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0872
87
reference_url https://usn.ubuntu.com/1009-1/
reference_id USN-1009-1
reference_type
scores
url https://usn.ubuntu.com/1009-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.11.2-8?distro=trixie
purl pkg:deb/debian/glibc@2.11.2-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.2-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2010-3856
risk_score 10.0
exploitability 2.0
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f7mh-4xkf-7fha
59
url VCID-f7vd-cpza-xfcx
vulnerability_id VCID-f7vd-cpza-xfcx
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which allows context-dependent attackers to execute arbitrary
    code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-2573.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2573.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3075
reference_id
reference_type
scores
0
value 0.10879
scoring_system epss
scoring_elements 0.93351
published_at 2026-04-01T12:55:00Z
1
value 0.10879
scoring_system epss
scoring_elements 0.93406
published_at 2026-04-18T12:55:00Z
2
value 0.10879
scoring_system epss
scoring_elements 0.93383
published_at 2026-04-13T12:55:00Z
3
value 0.10879
scoring_system epss
scoring_elements 0.93382
published_at 2026-04-12T12:55:00Z
4
value 0.10879
scoring_system epss
scoring_elements 0.93401
published_at 2026-04-16T12:55:00Z
5
value 0.10879
scoring_system epss
scoring_elements 0.93359
published_at 2026-04-02T12:55:00Z
6
value 0.10879
scoring_system epss
scoring_elements 0.93367
published_at 2026-04-07T12:55:00Z
7
value 0.10879
scoring_system epss
scoring_elements 0.93374
published_at 2026-04-08T12:55:00Z
8
value 0.10879
scoring_system epss
scoring_elements 0.93378
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3075
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=19879
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=19879
9
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
10
reference_url http://www.securityfocus.com/bid/85732
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85732
11
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1321866
reference_id 1321866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1321866
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3075
reference_id CVE-2016-3075
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3075
20
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
21
reference_url https://access.redhat.com/errata/RHSA-2016:2573
reference_id RHSA-2016:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2573
22
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.22-6?distro=trixie
purl pkg:deb/debian/glibc@2.22-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-6%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-3075
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f7vd-cpza-xfcx
60
url VCID-f9ts-xn57-6qa8
vulnerability_id VCID-f9ts-xn57-6qa8
summary glibc: Memory leak reachable via LD_HWCAP_MASK
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000408
reference_id
reference_type
scores
0
value 0.00761
scoring_system epss
scoring_elements 0.73295
published_at 2026-04-01T12:55:00Z
1
value 0.00764
scoring_system epss
scoring_elements 0.73386
published_at 2026-04-02T12:55:00Z
2
value 0.00764
scoring_system epss
scoring_elements 0.73409
published_at 2026-04-04T12:55:00Z
3
value 0.00764
scoring_system epss
scoring_elements 0.73381
published_at 2026-04-07T12:55:00Z
4
value 0.00764
scoring_system epss
scoring_elements 0.73418
published_at 2026-04-08T12:55:00Z
5
value 0.00764
scoring_system epss
scoring_elements 0.73432
published_at 2026-04-09T12:55:00Z
6
value 0.00764
scoring_system epss
scoring_elements 0.73455
published_at 2026-04-11T12:55:00Z
7
value 0.00764
scoring_system epss
scoring_elements 0.73435
published_at 2026-04-12T12:55:00Z
8
value 0.00764
scoring_system epss
scoring_elements 0.73427
published_at 2026-04-13T12:55:00Z
9
value 0.00764
scoring_system epss
scoring_elements 0.7347
published_at 2026-04-16T12:55:00Z
10
value 0.00764
scoring_system epss
scoring_elements 0.73478
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1522828
reference_id 1522828
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1522828
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132
reference_id 884132
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt
reference_id CVE-2017-1000409;CVE-2017-1000408
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt
6
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.25-5?distro=trixie
purl pkg:deb/debian/glibc@2.25-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-5%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-1000408
risk_score 6.0
exploitability 2.0
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ts-xn57-6qa8
61
url VCID-fjrd-sadn-kfcf
vulnerability_id VCID-fjrd-sadn-kfcf
summary glibc: potential denial of service in internal_fnmatch()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8984
reference_id
reference_type
scores
0
value 0.00756
scoring_system epss
scoring_elements 0.73305
published_at 2026-04-18T12:55:00Z
1
value 0.00756
scoring_system epss
scoring_elements 0.73297
published_at 2026-04-16T12:55:00Z
2
value 0.00756
scoring_system epss
scoring_elements 0.73203
published_at 2026-04-01T12:55:00Z
3
value 0.00756
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-02T12:55:00Z
4
value 0.00756
scoring_system epss
scoring_elements 0.73234
published_at 2026-04-04T12:55:00Z
5
value 0.00756
scoring_system epss
scoring_elements 0.73207
published_at 2026-04-07T12:55:00Z
6
value 0.00756
scoring_system epss
scoring_elements 0.73244
published_at 2026-04-08T12:55:00Z
7
value 0.00756
scoring_system epss
scoring_elements 0.73257
published_at 2026-04-09T12:55:00Z
8
value 0.00756
scoring_system epss
scoring_elements 0.73281
published_at 2026-04-11T12:55:00Z
9
value 0.00756
scoring_system epss
scoring_elements 0.73261
published_at 2026-04-12T12:55:00Z
10
value 0.00756
scoring_system epss
scoring_elements 0.73254
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8984
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18032
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=18032
4
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
5
reference_url https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
reference_id
reference_type
scores
url https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
6
reference_url http://www.openwall.com/lists/oss-security/2015/02/26/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/02/26/5
7
reference_url http://www.openwall.com/lists/oss-security/2017/02/14/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/02/14/9
8
reference_url http://www.securityfocus.com/bid/72789
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/72789
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1197730
reference_id 1197730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1197730
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587
reference_id 779587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8984
reference_id CVE-2015-8984
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8984
13
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8984
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fjrd-sadn-kfcf
62
url VCID-gbqk-t5bg-dyby
vulnerability_id VCID-gbqk-t5bg-dyby
summary
Multiple vulnerabilities have been found in GNU C Library, the
    worst of which allowing arbitrary code execution and privilege escalation.
references
0
reference_url http://openwall.com/lists/oss-security/2011/03/04/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/10
1
reference_url http://openwall.com/lists/oss-security/2011/03/04/11
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/11
2
reference_url http://openwall.com/lists/oss-security/2011/03/04/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/12
3
reference_url http://openwall.com/lists/oss-security/2011/03/04/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/04/9
4
reference_url http://openwall.com/lists/oss-security/2011/03/05/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/05/3
5
reference_url http://openwall.com/lists/oss-security/2011/03/05/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/05/7
6
reference_url http://openwall.com/lists/oss-security/2011/03/07/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/07/9
7
reference_url http://openwall.com/lists/oss-security/2011/03/14/16
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/14/16
8
reference_url http://openwall.com/lists/oss-security/2011/03/14/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/14/5
9
reference_url http://openwall.com/lists/oss-security/2011/03/14/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/14/7
10
reference_url http://openwall.com/lists/oss-security/2011/03/15/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/15/6
11
reference_url http://openwall.com/lists/oss-security/2011/03/22/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/22/4
12
reference_url http://openwall.com/lists/oss-security/2011/03/22/6
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/22/6
13
reference_url http://openwall.com/lists/oss-security/2011/03/31/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/31/3
14
reference_url http://openwall.com/lists/oss-security/2011/03/31/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/31/4
15
reference_url http://openwall.com/lists/oss-security/2011/04/01/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/04/01/2
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1089.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1089.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1089
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25018
published_at 2026-04-18T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25091
published_at 2026-04-01T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25172
published_at 2026-04-02T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25213
published_at 2026-04-04T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24984
published_at 2026-04-07T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25052
published_at 2026-04-08T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25097
published_at 2026-04-09T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25112
published_at 2026-04-11T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25071
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25017
published_at 2026-04-13T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25026
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1089
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089
19
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=12625
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=12625
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
22
reference_url http://www.redhat.com/support/errata/RHSA-2011-1526.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-1526.html
23
reference_url http://www.securityfocus.com/bid/46740
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46740
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=688980
reference_id 688980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=688980
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1089
reference_id CVE-2011-1089
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1089
84
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
85
reference_url https://access.redhat.com/errata/RHSA-2011:1526
reference_id RHSA-2011:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1526
86
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
87
reference_url https://access.redhat.com/errata/RHSA-2012:0126
reference_id RHSA-2012:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0126
88
reference_url https://usn.ubuntu.com/1396-1/
reference_id USN-1396-1
reference_type
scores
url https://usn.ubuntu.com/1396-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.13-8?distro=trixie
purl pkg:deb/debian/glibc@2.13-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2011-1089
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbqk-t5bg-dyby
63
url VCID-ge24-a7a4-d3bn
vulnerability_id VCID-ge24-a7a4-d3bn
summary Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35942
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78075
published_at 2026-04-01T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-11T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78083
published_at 2026-04-02T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-09T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78123
published_at 2026-04-08T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-04T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-07T12:55:00Z
7
value 0.01598
scoring_system epss
scoring_elements 0.8172
published_at 2026-04-18T12:55:00Z
8
value 0.01598
scoring_system epss
scoring_elements 0.81688
published_at 2026-04-12T12:55:00Z
9
value 0.01598
scoring_system epss
scoring_elements 0.81682
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1977975
reference_id 1977975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1977975
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542
reference_id 990542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542
6
reference_url https://security.archlinux.org/AVG-1621
reference_id AVG-1621
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1621
7
reference_url https://security.gentoo.org/glsa/202208-24
reference_id GLSA-202208-24
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/
url https://security.gentoo.org/glsa/202208-24
8
reference_url https://security.netapp.com/advisory/ntap-20210827-0005/
reference_id ntap-20210827-0005
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/
url https://security.netapp.com/advisory/ntap-20210827-0005/
9
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
reference_id ?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
10
reference_url https://access.redhat.com/errata/RHSA-2021:4358
reference_id RHSA-2021:4358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4358
11
reference_url https://sourceware.org/glibc/wiki/Security%20Exceptions
reference_id Security%20Exceptions
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/
url https://sourceware.org/glibc/wiki/Security%20Exceptions
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=28011
reference_id show_bug.cgi?id=28011
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=28011
13
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
14
reference_url https://usn.ubuntu.com/5699-1/
reference_id USN-5699-1
reference_type
scores
url https://usn.ubuntu.com/5699-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13?distro=trixie
purl pkg:deb/debian/glibc@2.31-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-35942
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn
64
url VCID-gv4u-g36a-w3cf
vulnerability_id VCID-gv4u-g36a-w3cf
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4911
reference_id
reference_type
scores
0
value 0.59128
scoring_system epss
scoring_elements 0.9822
published_at 2026-04-02T12:55:00Z
1
value 0.59128
scoring_system epss
scoring_elements 0.98223
published_at 2026-04-04T12:55:00Z
2
value 0.72535
scoring_system epss
scoring_elements 0.98763
published_at 2026-04-07T12:55:00Z
3
value 0.72771
scoring_system epss
scoring_elements 0.98771
published_at 2026-04-08T12:55:00Z
4
value 0.74256
scoring_system epss
scoring_elements 0.9884
published_at 2026-04-13T12:55:00Z
5
value 0.74256
scoring_system epss
scoring_elements 0.98837
published_at 2026-04-09T12:55:00Z
6
value 0.74256
scoring_system epss
scoring_elements 0.98845
published_at 2026-04-18T12:55:00Z
7
value 0.74256
scoring_system epss
scoring_elements 0.98839
published_at 2026-04-12T12:55:00Z
8
value 0.74256
scoring_system epss
scoring_elements 0.98844
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238352
reference_id 2238352
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2238352
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
reference_id cpe:/a:redhat:rhel_eus:8.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
reference_id cpe:/o:redhat:rhel_eus:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_id cpe:/o:redhat:rhev_hypervisor:4.4::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8
20
reference_url https://www.qualys.com/cve-2023-4911/
reference_id cve-2023-4911
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://www.qualys.com/cve-2023-4911/
21
reference_url https://access.redhat.com/security/cve/CVE-2023-4911
reference_id CVE-2023-4911
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/security/cve/CVE-2023-4911
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt
reference_id CVE-2023-4911
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt
23
reference_url https://security.gentoo.org/glsa/202310-03
reference_id GLSA-202310-03
reference_type
scores
url https://security.gentoo.org/glsa/202310-03
24
reference_url https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
reference_id looney-tunables-local-privilege-escalation-glibc-ld-so.txt
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
25
reference_url https://access.redhat.com/errata/RHSA-2023:5453
reference_id RHSA-2023:5453
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5453
26
reference_url https://access.redhat.com/errata/RHSA-2023:5454
reference_id RHSA-2023:5454
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5454
27
reference_url https://access.redhat.com/errata/RHSA-2023:5455
reference_id RHSA-2023:5455
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5455
28
reference_url https://access.redhat.com/errata/RHSA-2023:5476
reference_id RHSA-2023:5476
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2023:5476
29
reference_url https://access.redhat.com/errata/RHSA-2024:0033
reference_id RHSA-2024:0033
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/
url https://access.redhat.com/errata/RHSA-2024:0033
30
reference_url https://usn.ubuntu.com/6409-1/
reference_id USN-6409-1
reference_type
scores
url https://usn.ubuntu.com/6409-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u7%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-12?distro=trixie
purl pkg:deb/debian/glibc@2.37-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-12%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-4911
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf
65
url VCID-hdz6-ewkg-xqc9
vulnerability_id VCID-hdz6-ewkg-xqc9
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15804
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43014
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43127
published_at 2026-04-18T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43104
published_at 2026-04-09T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43126
published_at 2026-04-11T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43077
published_at 2026-04-13T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43137
published_at 2026-04-16T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43072
published_at 2026-04-02T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.431
published_at 2026-04-04T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43039
published_at 2026-04-07T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43092
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15804
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22332
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22332
5
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
6
reference_url http://www.securityfocus.com/bid/101535
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101535
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1505298
reference_id 1505298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1505298
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955
reference_id 879955
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15804
reference_id CVE-2017-15804
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15804
11
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
12
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
13
reference_url https://access.redhat.com/errata/RHSA-2018:1879
reference_id RHSA-2018:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1879
14
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.25-3?distro=trixie
purl pkg:deb/debian/glibc@2.25-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-15804
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz6-ewkg-xqc9
66
url VCID-hh17-b5wu-myav
vulnerability_id VCID-hh17-b5wu-myav
summary security flaw
references
0
reference_url http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507
reference_id
reference_type
scores
url http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507
1
reference_url http://marc.info/?l=bugtraq&m=102581482511612&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=102581482511612&w=2
2
reference_url http://rhn.redhat.com/errata/RHSA-2002-139.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2002-139.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0684.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0684.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0684
reference_id
reference_type
scores
0
value 0.03647
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-18T12:55:00Z
1
value 0.03647
scoring_system epss
scoring_elements 0.87805
published_at 2026-04-01T12:55:00Z
2
value 0.03647
scoring_system epss
scoring_elements 0.87816
published_at 2026-04-02T12:55:00Z
3
value 0.03647
scoring_system epss
scoring_elements 0.87827
published_at 2026-04-04T12:55:00Z
4
value 0.03647
scoring_system epss
scoring_elements 0.87831
published_at 2026-04-07T12:55:00Z
5
value 0.03647
scoring_system epss
scoring_elements 0.87852
published_at 2026-04-08T12:55:00Z
6
value 0.03647
scoring_system epss
scoring_elements 0.87859
published_at 2026-04-09T12:55:00Z
7
value 0.03647
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-11T12:55:00Z
8
value 0.03647
scoring_system epss
scoring_elements 0.87863
published_at 2026-04-12T12:55:00Z
9
value 0.03647
scoring_system epss
scoring_elements 0.87862
published_at 2026-04-13T12:55:00Z
10
value 0.03647
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0684
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0684
6
reference_url http://www.kb.cert.org/vuls/id/542971
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/542971
7
reference_url http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php
reference_id
reference_type
scores
url http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616795
reference_id 1616795
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616795
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-0684
reference_id CVE-2002-0684
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2002-0684
12
reference_url https://access.redhat.com/errata/RHSA-2002:139
reference_id RHSA-2002:139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:139
13
reference_url https://access.redhat.com/errata/RHSA-2002:167
reference_id RHSA-2002:167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:167
14
reference_url https://access.redhat.com/errata/RHSA-2003:212
reference_id RHSA-2003:212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:212
fixed_packages
0
url pkg:deb/debian/glibc@2.2.5-8?distro=trixie
purl pkg:deb/debian/glibc@2.2.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2002-0684
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hh17-b5wu-myav
67
url VCID-hj77-4nfx-fuaa
vulnerability_id VCID-hj77-4nfx-fuaa
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29562
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16125
published_at 2026-04-01T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16149
published_at 2026-04-18T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16308
published_at 2026-04-02T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1637
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16169
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16255
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16319
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16301
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16261
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16193
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16131
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29562
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1905217
reference_id 1905217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1905217
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391
reference_id 976391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391
6
reference_url https://security.archlinux.org/ASA-202102-16
reference_id ASA-202102-16
reference_type
scores
url https://security.archlinux.org/ASA-202102-16
7
reference_url https://security.archlinux.org/ASA-202102-17
reference_id ASA-202102-17
reference_type
scores
url https://security.archlinux.org/ASA-202102-17
8
reference_url https://security.archlinux.org/AVG-1320
reference_id AVG-1320
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1320
9
reference_url https://security.gentoo.org/glsa/202101-20
reference_id GLSA-202101-20
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/
url https://security.gentoo.org/glsa/202101-20
10
reference_url https://security.netapp.com/advisory/ntap-20210122-0004/
reference_id ntap-20210122-0004
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/
url https://security.netapp.com/advisory/ntap-20210122-0004/
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=26923
reference_id show_bug.cgi?id=26923
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=26923
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
reference_id TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
13
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-7?distro=trixie
purl pkg:deb/debian/glibc@2.31-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-7%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2020-29562
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj77-4nfx-fuaa
68
url VCID-hkyd-8rrg-v3e7
vulnerability_id VCID-hkyd-8rrg-v3e7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3406
reference_id
reference_type
scores
0
value 0.00869
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-01T12:55:00Z
1
value 0.00869
scoring_system epss
scoring_elements 0.75135
published_at 2026-04-02T12:55:00Z
2
value 0.00869
scoring_system epss
scoring_elements 0.75165
published_at 2026-04-04T12:55:00Z
3
value 0.00869
scoring_system epss
scoring_elements 0.75142
published_at 2026-04-07T12:55:00Z
4
value 0.00869
scoring_system epss
scoring_elements 0.75176
published_at 2026-04-13T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-09T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75209
published_at 2026-04-11T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75187
published_at 2026-04-12T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.75213
published_at 2026-04-16T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75219
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3406
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888
reference_id 681888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=826943
reference_id 826943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=826943
10
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
11
reference_url https://access.redhat.com/errata/RHSA-2012:1097
reference_id RHSA-2012:1097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1097
12
reference_url https://access.redhat.com/errata/RHSA-2012:1098
reference_id RHSA-2012:1098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1098
13
reference_url https://access.redhat.com/errata/RHSA-2012:1200
reference_id RHSA-2012:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1200
14
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-14?distro=trixie
purl pkg:deb/debian/glibc@2.19-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2012-3406
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7
69
url VCID-hrky-wxm3-5fh3
vulnerability_id VCID-hrky-wxm3-5fh3
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29573
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.36892
published_at 2026-04-01T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36963
published_at 2026-04-18T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.36934
published_at 2026-04-13T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36979
published_at 2026-04-16T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.37061
published_at 2026-04-02T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37094
published_at 2026-04-04T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-07T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36973
published_at 2026-04-08T12:55:00Z
8
value 0.00161
scoring_system epss
scoring_elements 0.36986
published_at 2026-04-09T12:55:00Z
9
value 0.00161
scoring_system epss
scoring_elements 0.36995
published_at 2026-04-11T12:55:00Z
10
value 0.00161
scoring_system epss
scoring_elements 0.3696
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1905213
reference_id 1905213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1905213
5
reference_url https://security.archlinux.org/AVG-1324
reference_id AVG-1324
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1324
6
reference_url https://security.gentoo.org/glsa/202101-20
reference_id GLSA-202101-20
reference_type
scores
url https://security.gentoo.org/glsa/202101-20
7
reference_url https://access.redhat.com/errata/RHSA-2021:0348
reference_id RHSA-2021:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0348
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://access.redhat.com/errata/RHSA-2021:2813
reference_id RHSA-2021:2813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2813
10
reference_url https://access.redhat.com/errata/RHSA-2021:2998
reference_id RHSA-2021:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2998
11
reference_url https://access.redhat.com/errata/RHSA-2021:3315
reference_id RHSA-2021:3315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3315
fixed_packages
0
url pkg:deb/debian/glibc@2.23-1?distro=trixie
purl pkg:deb/debian/glibc@2.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2020-29573
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrky-wxm3-5fh3
70
url VCID-hu2t-wcga-c3e9
vulnerability_id VCID-hu2t-wcga-c3e9
summary
Multiple vulnerabilities have been found in GNU C Library, the
    worst of which allowing arbitrary code execution and privilege escalation.
references
0
reference_url http://bugs.debian.org/615120
reference_id
reference_type
scores
url http://bugs.debian.org/615120
1
reference_url http://code.google.com/p/chromium/issues/detail?id=48733
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=48733
2
reference_url http://openwall.com/lists/oss-security/2011/02/26/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/26/3
3
reference_url http://openwall.com/lists/oss-security/2011/02/28/11
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/28/11
4
reference_url http://openwall.com/lists/oss-security/2011/02/28/15
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/28/15
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1071.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1071.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1071
reference_id
reference_type
scores
0
value 0.05233
scoring_system epss
scoring_elements 0.89979
published_at 2026-04-18T12:55:00Z
1
value 0.05233
scoring_system epss
scoring_elements 0.89921
published_at 2026-04-01T12:55:00Z
2
value 0.05233
scoring_system epss
scoring_elements 0.89924
published_at 2026-04-02T12:55:00Z
3
value 0.05233
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-04T12:55:00Z
4
value 0.05233
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-07T12:55:00Z
5
value 0.05233
scoring_system epss
scoring_elements 0.89959
published_at 2026-04-08T12:55:00Z
6
value 0.05233
scoring_system epss
scoring_elements 0.89965
published_at 2026-04-09T12:55:00Z
7
value 0.05233
scoring_system epss
scoring_elements 0.89973
published_at 2026-04-11T12:55:00Z
8
value 0.05233
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-12T12:55:00Z
9
value 0.05233
scoring_system epss
scoring_elements 0.89964
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1071
7
reference_url http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html
reference_id
reference_type
scores
url http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071
9
reference_url http://seclists.org/fulldisclosure/2011/Feb/635
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2011/Feb/635
10
reference_url http://seclists.org/fulldisclosure/2011/Feb/644
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2011/Feb/644
11
reference_url http://secunia.com/advisories/43492
reference_id
reference_type
scores
url http://secunia.com/advisories/43492
12
reference_url http://secunia.com/advisories/43830
reference_id
reference_type
scores
url http://secunia.com/advisories/43830
13
reference_url http://secunia.com/advisories/43989
reference_id
reference_type
scores
url http://secunia.com/advisories/43989
14
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
15
reference_url http://securityreason.com/securityalert/8175
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8175
16
reference_url http://securitytracker.com/id?1025290
reference_id
reference_type
scores
url http://securitytracker.com/id?1025290
17
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=11883
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=11883
18
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
21
reference_url http://www.redhat.com/support/errata/RHSA-2011-0412.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0412.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2011-0413.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0413.html
23
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
24
reference_url http://www.securityfocus.com/bid/46563
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46563
25
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
26
reference_url http://www.vupen.com/english/advisories/2011/0863
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0863
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=681054
reference_id 681054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=681054
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
85
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17120.c
reference_id CVE-2011-1071
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17120.c
86
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1071
reference_id CVE-2011-1071
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1071
87
reference_url https://www.securityfocus.com/bid/46563/info
reference_id CVE-2011-1071
reference_type exploit
scores
url https://www.securityfocus.com/bid/46563/info
88
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
89
reference_url https://access.redhat.com/errata/RHSA-2011:0412
reference_id RHSA-2011:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0412
90
reference_url https://access.redhat.com/errata/RHSA-2011:0413
reference_id RHSA-2011:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0413
91
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
92
reference_url https://usn.ubuntu.com/1396-1/
reference_id USN-1396-1
reference_type
scores
url https://usn.ubuntu.com/1396-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.11.2-12?distro=trixie
purl pkg:deb/debian/glibc@2.11.2-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.2-12%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2011-1071
risk_score 9.2
exploitability 2.0
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hu2t-wcga-c3e9
71
url VCID-jadt-55f6-uuh6
vulnerability_id VCID-jadt-55f6-uuh6
summary glibc: Use-after-free read access in clntudp_call in sunrpc
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12133
reference_id
reference_type
scores
0
value 0.00474
scoring_system epss
scoring_elements 0.64663
published_at 2026-04-01T12:55:00Z
1
value 0.00474
scoring_system epss
scoring_elements 0.6479
published_at 2026-04-18T12:55:00Z
2
value 0.00474
scoring_system epss
scoring_elements 0.64769
published_at 2026-04-12T12:55:00Z
3
value 0.00474
scoring_system epss
scoring_elements 0.64742
published_at 2026-04-13T12:55:00Z
4
value 0.00474
scoring_system epss
scoring_elements 0.64779
published_at 2026-04-16T12:55:00Z
5
value 0.00474
scoring_system epss
scoring_elements 0.64715
published_at 2026-04-02T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.64744
published_at 2026-04-04T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.64702
published_at 2026-04-07T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64749
published_at 2026-04-08T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64764
published_at 2026-04-09T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.64781
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1478288
reference_id 1478288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1478288
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648
reference_id 870648
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648
6
reference_url https://security.archlinux.org/AVG-368
reference_id AVG-368
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-368
7
reference_url https://security.archlinux.org/AVG-369
reference_id AVG-369
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-369
8
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.24-15?distro=trixie
purl pkg:deb/debian/glibc@2.24-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-15%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-12133
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jadt-55f6-uuh6
72
url VCID-jkcw-geyg-t3e5
vulnerability_id VCID-jkcw-geyg-t3e5
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6780.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6780
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44096
published_at 2026-04-18T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44092
published_at 2026-04-11T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.4406
published_at 2026-04-12T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.44044
published_at 2026-04-13T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.44105
published_at 2026-04-16T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.4625
published_at 2026-04-04T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46231
published_at 2026-04-02T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46256
published_at 2026-04-09T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46254
published_at 2026-04-08T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46198
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6780
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254396
reference_id 2254396
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2254396
4
reference_url http://seclists.org/fulldisclosure/2024/Feb/3
reference_id 3
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url http://seclists.org/fulldisclosure/2024/Feb/3
5
reference_url https://www.openwall.com/lists/oss-security/2024/01/30/6
reference_id 6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url https://www.openwall.com/lists/oss-security/2024/01/30/6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2023-6780
reference_id CVE-2023-6780
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url https://access.redhat.com/security/cve/CVE-2023-6780
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
reference_id D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
12
reference_url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_id glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
13
reference_url https://security.gentoo.org/glsa/202402-01
reference_id GLSA-202402-01
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url https://security.gentoo.org/glsa/202402-01
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
reference_id MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
15
reference_url https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
reference_id syslog.txt
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/
url https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
16
reference_url https://usn.ubuntu.com/6620-1/
reference_id USN-6620-1
reference_type
scores
url https://usn.ubuntu.com/6620-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-15?distro=trixie
purl pkg:deb/debian/glibc@2.37-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-15%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-6780
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jkcw-geyg-t3e5
73
url VCID-jnz7-w98a-kqgs
vulnerability_id VCID-jnz7-w98a-kqgs
summary glibc: getaddrinfo should reject IP addresses with trailing characters
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10739
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06264
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06297
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06331
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06307
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06394
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06387
published_at 2026-04-11T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1233
published_at 2026-04-12T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12292
published_at 2026-04-13T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12189
published_at 2026-04-16T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12192
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10739
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=20018
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=20018
6
reference_url http://www.securityfocus.com/bid/106672
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106672
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1347549
reference_id 1347549
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1347549
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047
reference_id 920047
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047
9
reference_url https://security.archlinux.org/AVG-1984
reference_id AVG-1984
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1984
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10739
reference_id CVE-2016-10739
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-10739
13
reference_url https://access.redhat.com/errata/RHSA-2019:2118
reference_id RHSA-2019:2118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2118
14
reference_url https://access.redhat.com/errata/RHSA-2019:3513
reference_id RHSA-2019:3513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3513
fixed_packages
0
url pkg:deb/debian/glibc@2.28-6?distro=trixie
purl pkg:deb/debian/glibc@2.28-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-6%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-10739
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnz7-w98a-kqgs
74
url VCID-jswq-6ru6-wybc
vulnerability_id VCID-jswq-6ru6-wybc
summary glibc: potential use-after-free in gaih_inet()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4813.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4813
reference_id
reference_type
scores
0
value 0.00304
scoring_system epss
scoring_elements 0.53607
published_at 2026-04-02T12:55:00Z
1
value 0.00304
scoring_system epss
scoring_elements 0.53635
published_at 2026-04-04T12:55:00Z
2
value 0.00304
scoring_system epss
scoring_elements 0.53604
published_at 2026-04-07T12:55:00Z
3
value 0.00304
scoring_system epss
scoring_elements 0.53655
published_at 2026-04-08T12:55:00Z
4
value 0.00304
scoring_system epss
scoring_elements 0.53653
published_at 2026-04-09T12:55:00Z
5
value 0.00304
scoring_system epss
scoring_elements 0.53702
published_at 2026-04-11T12:55:00Z
6
value 0.00304
scoring_system epss
scoring_elements 0.53685
published_at 2026-04-12T12:55:00Z
7
value 0.00304
scoring_system epss
scoring_elements 0.53668
published_at 2026-04-13T12:55:00Z
8
value 0.00304
scoring_system epss
scoring_elements 0.53706
published_at 2026-04-16T12:55:00Z
9
value 0.00304
scoring_system epss
scoring_elements 0.53711
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2237798
reference_id 2237798
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2237798
5
reference_url https://access.redhat.com/errata/RHSA-2023:5453
reference_id RHSA-2023:5453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5453
6
reference_url https://access.redhat.com/errata/RHSA-2023:5455
reference_id RHSA-2023:5455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5455
7
reference_url https://access.redhat.com/errata/RHSA-2023:7409
reference_id RHSA-2023:7409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7409
8
reference_url https://usn.ubuntu.com/6541-1/
reference_id USN-6541-1
reference_type
scores
url https://usn.ubuntu.com/6541-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.36-3?distro=trixie
purl pkg:deb/debian/glibc@2.36-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-4813
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jswq-6ru6-wybc
75
url VCID-k8c9-hx6q-mbfq
vulnerability_id VCID-k8c9-hx6q-mbfq
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39046.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39046
reference_id
reference_type
scores
0
value 0.00685
scoring_system epss
scoring_elements 0.71628
published_at 2026-04-02T12:55:00Z
1
value 0.00685
scoring_system epss
scoring_elements 0.71646
published_at 2026-04-04T12:55:00Z
2
value 0.00685
scoring_system epss
scoring_elements 0.71619
published_at 2026-04-07T12:55:00Z
3
value 0.00685
scoring_system epss
scoring_elements 0.71659
published_at 2026-04-08T12:55:00Z
4
value 0.00685
scoring_system epss
scoring_elements 0.7167
published_at 2026-04-09T12:55:00Z
5
value 0.00685
scoring_system epss
scoring_elements 0.71694
published_at 2026-04-11T12:55:00Z
6
value 0.00685
scoring_system epss
scoring_elements 0.71677
published_at 2026-04-12T12:55:00Z
7
value 0.00685
scoring_system epss
scoring_elements 0.71658
published_at 2026-04-13T12:55:00Z
8
value 0.00685
scoring_system epss
scoring_elements 0.71702
published_at 2026-04-16T12:55:00Z
9
value 0.00685
scoring_system epss
scoring_elements 0.71708
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39046
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123394
reference_id 2123394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123394
4
reference_url https://security.gentoo.org/glsa/202310-03
reference_id GLSA-202310-03
reference_type
scores
url https://security.gentoo.org/glsa/202310-03
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2022-39046
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8c9-hx6q-mbfq
76
url VCID-kb2y-nbd3-mudm
vulnerability_id VCID-kb2y-nbd3-mudm
summary Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0537
reference_id
reference_type
scores
0
value 0.07054
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-18T12:55:00Z
1
value 0.07054
scoring_system epss
scoring_elements 0.91456
published_at 2026-04-01T12:55:00Z
2
value 0.07054
scoring_system epss
scoring_elements 0.91462
published_at 2026-04-02T12:55:00Z
3
value 0.07054
scoring_system epss
scoring_elements 0.91469
published_at 2026-04-04T12:55:00Z
4
value 0.07054
scoring_system epss
scoring_elements 0.91477
published_at 2026-04-07T12:55:00Z
5
value 0.07054
scoring_system epss
scoring_elements 0.9149
published_at 2026-04-08T12:55:00Z
6
value 0.07054
scoring_system epss
scoring_elements 0.91496
published_at 2026-04-09T12:55:00Z
7
value 0.07054
scoring_system epss
scoring_elements 0.91501
published_at 2026-04-13T12:55:00Z
8
value 0.07054
scoring_system epss
scoring_elements 0.91503
published_at 2026-04-12T12:55:00Z
9
value 0.07054
scoring_system epss
scoring_elements 0.91524
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0537
1
reference_url http://securityreason.com/achievement_securityalert/60
reference_id
reference_type
scores
url http://securityreason.com/achievement_securityalert/60
2
reference_url https://www.exploit-db.com/exploits/8163
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/8163
3
reference_url http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c
reference_id
reference_type
scores
url http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c
4
reference_url http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41%3Br2=1.42%3Bf=h
reference_id
reference_type
scores
url http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41%3Br2=1.42%3Bf=h
5
reference_url http://www.securityfocus.com/archive/1/501505/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501505/100/0/threaded
6
reference_url http://www.securityfocus.com/bid/34008
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34008
7
reference_url http://www.securitytracker.com/id?1021818
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021818
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:interix:6.0:*:10.0.6030.0:*:*:*:*:*
reference_id cpe:2.3:a:microsoft:interix:6.0:*:10.0.6030.0:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:interix:6.0:*:10.0.6030.0:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0537
reference_id CVE-2009-0537
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-0537
35
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/8163.txt
reference_id OSVDB-52463;CVE-2009-0537
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/8163.txt
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2009-0537
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kb2y-nbd3-mudm
77
url VCID-kpcn-f4dw-97hm
vulnerability_id VCID-kpcn-f4dw-97hm
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2207
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21683
published_at 2026-04-18T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21822
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21874
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21627
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21703
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.2176
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21771
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21732
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21675
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544
reference_id 717544
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976408
reference_id 976408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976408
6
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
7
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-2207
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm
78
url VCID-kqud-8xme-x7dq
vulnerability_id VCID-kqud-8xme-x7dq
summary glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-0199.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-0199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-1999-0199
reference_id
reference_type
scores
0
value 0.00793
scoring_system epss
scoring_elements 0.73867
published_at 2026-04-01T12:55:00Z
1
value 0.00793
scoring_system epss
scoring_elements 0.73877
published_at 2026-04-02T12:55:00Z
2
value 0.00793
scoring_system epss
scoring_elements 0.73902
published_at 2026-04-04T12:55:00Z
3
value 0.00793
scoring_system epss
scoring_elements 0.73874
published_at 2026-04-07T12:55:00Z
4
value 0.00793
scoring_system epss
scoring_elements 0.73908
published_at 2026-04-08T12:55:00Z
5
value 0.00793
scoring_system epss
scoring_elements 0.73922
published_at 2026-04-09T12:55:00Z
6
value 0.00793
scoring_system epss
scoring_elements 0.73944
published_at 2026-04-11T12:55:00Z
7
value 0.00793
scoring_system epss
scoring_elements 0.73925
published_at 2026-04-12T12:55:00Z
8
value 0.00793
scoring_system epss
scoring_elements 0.73917
published_at 2026-04-13T12:55:00Z
9
value 0.00793
scoring_system epss
scoring_elements 0.73959
published_at 2026-04-16T12:55:00Z
10
value 0.00793
scoring_system epss
scoring_elements 0.73968
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-1999-0199
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0199
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1885775
reference_id 1885775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1885775
fixed_packages
0
url pkg:deb/debian/glibc@2.2-1?distro=trixie
purl pkg:deb/debian/glibc@2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-1999-0199
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kqud-8xme-x7dq
79
url VCID-kukb-s61t-pbc3
vulnerability_id VCID-kukb-s61t-pbc3
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8058.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-8058
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01131
published_at 2026-04-18T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00668
published_at 2026-04-04T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00675
published_at 2026-04-02T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00671
published_at 2026-04-07T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00936
published_at 2026-04-08T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00933
published_at 2026-04-09T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00921
published_at 2026-04-11T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00916
published_at 2026-04-12T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00917
published_at 2026-04-13T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00914
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-8058
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109803
reference_id 1109803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109803
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2383146
reference_id 2383146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2383146
6
reference_url https://security.gentoo.org/glsa/202509-04
reference_id GLSA-202509-04
reference_type
scores
url https://security.gentoo.org/glsa/202509-04
7
reference_url https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f
reference_id ?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T20:07:48Z/
url https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f
8
reference_url https://access.redhat.com/errata/RHSA-2025:12748
reference_id RHSA-2025:12748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12748
9
reference_url https://access.redhat.com/errata/RHSA-2025:12980
reference_id RHSA-2025:12980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12980
10
reference_url https://access.redhat.com/errata/RHSA-2025:13240
reference_id RHSA-2025:13240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13240
11
reference_url https://access.redhat.com/errata/RHSA-2025:13335
reference_id RHSA-2025:13335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13335
12
reference_url https://access.redhat.com/errata/RHSA-2025:13622
reference_id RHSA-2025:13622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13622
13
reference_url https://access.redhat.com/errata/RHSA-2025:14186
reference_id RHSA-2025:14186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14186
14
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22529
15
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33185
reference_id show_bug.cgi?id=33185
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T20:07:48Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33185
16
reference_url https://usn.ubuntu.com/7760-1/
reference_id USN-7760-1
reference_type
scores
url https://usn.ubuntu.com/7760-1/
17
reference_url https://usn.ubuntu.com/8005-1/
reference_id USN-8005-1
reference_type
scores
url https://usn.ubuntu.com/8005-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.41-11?distro=trixie
purl pkg:deb/debian/glibc@2.41-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2025-8058
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kukb-s61t-pbc3
80
url VCID-kwbk-pngd-3bh9
vulnerability_id VCID-kwbk-pngd-3bh9
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2015-0016.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2015-0016.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6040
reference_id
reference_type
scores
0
value 0.07187
scoring_system epss
scoring_elements 0.91606
published_at 2026-04-18T12:55:00Z
1
value 0.07187
scoring_system epss
scoring_elements 0.91544
published_at 2026-04-01T12:55:00Z
2
value 0.07187
scoring_system epss
scoring_elements 0.91551
published_at 2026-04-02T12:55:00Z
3
value 0.07187
scoring_system epss
scoring_elements 0.91558
published_at 2026-04-04T12:55:00Z
4
value 0.07187
scoring_system epss
scoring_elements 0.91566
published_at 2026-04-07T12:55:00Z
5
value 0.07187
scoring_system epss
scoring_elements 0.91579
published_at 2026-04-08T12:55:00Z
6
value 0.07187
scoring_system epss
scoring_elements 0.91585
published_at 2026-04-09T12:55:00Z
7
value 0.07187
scoring_system epss
scoring_elements 0.91589
published_at 2026-04-13T12:55:00Z
8
value 0.07187
scoring_system epss
scoring_elements 0.91591
published_at 2026-04-12T12:55:00Z
9
value 0.07187
scoring_system epss
scoring_elements 0.91612
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6040
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
7
reference_url http://secunia.com/advisories/62100
reference_id
reference_type
scores
url http://secunia.com/advisories/62100
8
reference_url http://secunia.com/advisories/62146
reference_id
reference_type
scores
url http://secunia.com/advisories/62146
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17325
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17325
10
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6
11
reference_url http://ubuntu.com/usn/usn-2432-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-2432-1
12
reference_url http://www.debian.org/security/2015/dsa-3142
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3142
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
14
reference_url http://www.openwall.com/lists/oss-security/2014/08/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/08/29/3
15
reference_url http://www.openwall.com/lists/oss-security/2014/09/02/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/09/02/1
16
reference_url http://www.securityfocus.com/bid/69472
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69472
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1135841
reference_id 1135841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1135841
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-6040
reference_id CVE-2014-6040
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-6040
48
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
49
reference_url https://access.redhat.com/errata/RHSA-2015:0016
reference_id RHSA-2015:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0016
50
reference_url https://access.redhat.com/errata/RHSA-2015:0327
reference_id RHSA-2015:0327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0327
51
reference_url https://usn.ubuntu.com/2432-1/
reference_id USN-2432-1
reference_type
scores
url https://usn.ubuntu.com/2432-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-12?distro=trixie
purl pkg:deb/debian/glibc@2.19-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-12%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-6040
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwbk-pngd-3bh9
81
url VCID-kxg9-kntn-xqan
vulnerability_id VCID-kxg9-kntn-xqan
summary glibc: memory corruption in memcpy-sse2-unaligned.S
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18269
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78068
published_at 2026-04-01T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78157
published_at 2026-04-18T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78128
published_at 2026-04-12T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78124
published_at 2026-04-13T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78158
published_at 2026-04-16T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78077
published_at 2026-04-02T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78107
published_at 2026-04-04T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78089
published_at 2026-04-07T12:55:00Z
8
value 0.01109
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-08T12:55:00Z
9
value 0.01109
scoring_system epss
scoring_elements 0.7812
published_at 2026-04-09T12:55:00Z
10
value 0.01109
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18269
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/fingolfin/memmove-bug
reference_id
reference_type
scores
url https://github.com/fingolfin/memmove-bug
5
reference_url https://security.netapp.com/advisory/ntap-20190329-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190329-0001/
6
reference_url https://security.netapp.com/advisory/ntap-20190401-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190401-0001/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22644
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22644
8
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1580924
reference_id 1580924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1580924
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-18269
reference_id CVE-2017-18269
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-18269
13
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.27-3?distro=trixie
purl pkg:deb/debian/glibc@2.27-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-18269
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxg9-kntn-xqan
82
url VCID-mneq-btk4-5be2
vulnerability_id VCID-mneq-btk4-5be2
summary Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2702.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2702.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2702
reference_id
reference_type
scores
0
value 0.03354
scoring_system epss
scoring_elements 0.87347
published_at 2026-04-18T12:55:00Z
1
value 0.03354
scoring_system epss
scoring_elements 0.87339
published_at 2026-04-11T12:55:00Z
2
value 0.03354
scoring_system epss
scoring_elements 0.87333
published_at 2026-04-12T12:55:00Z
3
value 0.03354
scoring_system epss
scoring_elements 0.87329
published_at 2026-04-13T12:55:00Z
4
value 0.03354
scoring_system epss
scoring_elements 0.87344
published_at 2026-04-16T12:55:00Z
5
value 0.03354
scoring_system epss
scoring_elements 0.87301
published_at 2026-04-07T12:55:00Z
6
value 0.03354
scoring_system epss
scoring_elements 0.8732
published_at 2026-04-08T12:55:00Z
7
value 0.03354
scoring_system epss
scoring_elements 0.87327
published_at 2026-04-09T12:55:00Z
8
value 0.04486
scoring_system epss
scoring_elements 0.89068
published_at 2026-04-02T12:55:00Z
9
value 0.04486
scoring_system epss
scoring_elements 0.89083
published_at 2026-04-04T12:55:00Z
10
value 0.04486
scoring_system epss
scoring_elements 0.89059
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2702
2
reference_url https://bugzilla.novell.com/show_bug.cgi?id=706915
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=706915
3
reference_url http://seclists.org/oss-sec/2011/q3/123
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2011/q3/123
4
reference_url http://seclists.org/oss-sec/2011/q3/153
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2011/q3/153
5
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e
reference_id
reference_type
scores
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e
6
reference_url http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032
reference_id
reference_type
scores
url http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032
7
reference_url http://www.nodefense.org/eglibc.txt
reference_id
reference_type
scores
url http://www.nodefense.org/eglibc.txt
8
reference_url http://www.osvdb.org/80718
reference_id
reference_type
scores
url http://www.osvdb.org/80718
9
reference_url http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/
reference_id
reference_type
scores
url http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-2702
reference_id CVE-2011-2702
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-2702
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/20167.txt
reference_id CVE-2011-2702;OSVDB-80718
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/20167.txt
16
reference_url https://usn.ubuntu.com/1396-1/
reference_id USN-1396-1
reference_type
scores
url https://usn.ubuntu.com/1396-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2011-2702
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mneq-btk4-5be2
83
url VCID-mqch-gxfq-zyhh
vulnerability_id VCID-mqch-gxfq-zyhh
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10029
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12802
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1295
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12753
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12833
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12884
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.1285
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12812
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12767
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.1267
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12677
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1810670
reference_id 1810670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1810670
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108
reference_id 953108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108
6
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
7
reference_url https://access.redhat.com/errata/RHSA-2020:4444
reference_id RHSA-2020:4444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4444
8
reference_url https://access.redhat.com/errata/RHSA-2021:0348
reference_id RHSA-2021:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0348
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://access.redhat.com/errata/RHSA-2021:2998
reference_id RHSA-2021:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2998
11
reference_url https://access.redhat.com/errata/RHSA-2021:3315
reference_id RHSA-2021:3315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3315
12
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.30-1?distro=trixie
purl pkg:deb/debian/glibc@2.30-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.30-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2020-10029
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqch-gxfq-zyhh
84
url VCID-mrha-gp2j-vkf7
vulnerability_id VCID-mrha-gp2j-vkf7
summary security flaw
references
0
reference_url ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt
1
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc
2
reference_url ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P
4
reference_url http://archives.neohapsis.com/archives/aix/2002-q4/0002.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://archives.neohapsis.com/archives/aix/2002-q4/0002.html
5
reference_url http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html
6
reference_url http://archives.neohapsis.com/archives/hp/2002-q3/0077.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://archives.neohapsis.com/archives/hp/2002-q3/0077.html
7
reference_url http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823
8
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515
9
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535
10
reference_url http://marc.info/?l=bugtraq&m=102813809232532&w=2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://marc.info/?l=bugtraq&m=102813809232532&w=2
11
reference_url http://marc.info/?l=bugtraq&m=102821785316087&w=2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://marc.info/?l=bugtraq&m=102821785316087&w=2
12
reference_url http://marc.info/?l=bugtraq&m=102821928418261&w=2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://marc.info/?l=bugtraq&m=102821928418261&w=2
13
reference_url http://marc.info/?l=bugtraq&m=102831443208382&w=2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://marc.info/?l=bugtraq&m=102831443208382&w=2
14
reference_url http://marc.info/?l=bugtraq&m=103158632831416&w=2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://marc.info/?l=bugtraq&m=103158632831416&w=2
15
reference_url http://online.securityfocus.com/advisories/4402
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://online.securityfocus.com/advisories/4402
16
reference_url http://online.securityfocus.com/archive/1/285740
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://online.securityfocus.com/archive/1/285740
17
reference_url http://rhn.redhat.com/errata/RHSA-2002-166.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://rhn.redhat.com/errata/RHSA-2002-166.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2002-172.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://rhn.redhat.com/errata/RHSA-2002-172.html
19
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json
20
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0391
reference_id
reference_type
scores
0
value 0.08258
scoring_system epss
scoring_elements 0.92205
published_at 2026-04-02T12:55:00Z
1
value 0.08258
scoring_system epss
scoring_elements 0.92211
published_at 2026-04-04T12:55:00Z
2
value 0.08258
scoring_system epss
scoring_elements 0.92198
published_at 2026-04-01T12:55:00Z
3
value 0.08258
scoring_system epss
scoring_elements 0.92243
published_at 2026-04-18T12:55:00Z
4
value 0.08258
scoring_system epss
scoring_elements 0.92214
published_at 2026-04-07T12:55:00Z
5
value 0.08258
scoring_system epss
scoring_elements 0.92229
published_at 2026-04-09T12:55:00Z
6
value 0.08258
scoring_system epss
scoring_elements 0.92225
published_at 2026-04-08T12:55:00Z
7
value 0.08258
scoring_system epss
scoring_elements 0.92234
published_at 2026-04-11T12:55:00Z
8
value 0.08258
scoring_system epss
scoring_elements 0.92235
published_at 2026-04-12T12:55:00Z
9
value 0.08258
scoring_system epss
scoring_elements 0.92232
published_at 2026-04-13T12:55:00Z
10
value 0.08258
scoring_system epss
scoring_elements 0.92244
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0391
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391
22
reference_url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9
26
reference_url http://www.cert.org/advisories/CA-2002-25.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.cert.org/advisories/CA-2002-25.html
27
reference_url http://www.debian.org/security/2002/dsa-142
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.debian.org/security/2002/dsa-142
28
reference_url http://www.debian.org/security/2002/dsa-143
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.debian.org/security/2002/dsa-143
29
reference_url http://www.debian.org/security/2002/dsa-146
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.debian.org/security/2002/dsa-146
30
reference_url http://www.debian.org/security/2002/dsa-149
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.debian.org/security/2002/dsa-149
31
reference_url http://www.debian.org/security/2003/dsa-333
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.debian.org/security/2003/dsa-333
32
reference_url http://www.iss.net/security_center/static/9170.php
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.iss.net/security_center/static/9170.php
33
reference_url http://www.kb.cert.org/vuls/id/192995
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.kb.cert.org/vuls/id/192995
34
reference_url http://www.linuxsecurity.com/advisories/other_advisory-2399.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.linuxsecurity.com/advisories/other_advisory-2399.html
35
reference_url http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057
36
reference_url http://www.redhat.com/support/errata/RHSA-2002-167.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.redhat.com/support/errata/RHSA-2002-167.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2002-173.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.redhat.com/support/errata/RHSA-2002-173.html
38
reference_url http://www.redhat.com/support/errata/RHSA-2003-168.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.redhat.com/support/errata/RHSA-2003-168.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2003-212.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.redhat.com/support/errata/RHSA-2003-212.html
40
reference_url http://www.securityfocus.com/bid/5356
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/
url http://www.securityfocus.com/bid/5356
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616771
reference_id 1616771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616771
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*
reference_id cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-0391
reference_id CVE-2002-0391
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2002-0391
53
reference_url https://access.redhat.com/errata/RHSA-2002:166
reference_id RHSA-2002:166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:166
54
reference_url https://access.redhat.com/errata/RHSA-2002:167
reference_id RHSA-2002:167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:167
55
reference_url https://access.redhat.com/errata/RHSA-2002:172
reference_id RHSA-2002:172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:172
56
reference_url https://access.redhat.com/errata/RHSA-2002:173
reference_id RHSA-2002:173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:173
57
reference_url https://access.redhat.com/errata/RHSA-2003:168
reference_id RHSA-2003:168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:168
58
reference_url https://access.redhat.com/errata/RHSA-2003:212
reference_id RHSA-2003:212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:212
fixed_packages
0
url pkg:deb/debian/glibc@2.2.5-13?distro=trixie
purl pkg:deb/debian/glibc@2.2.5-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-13%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2002-0391
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrha-gp2j-vkf7
85
url VCID-mt2t-g9ge-pfgz
vulnerability_id VCID-mt2t-g9ge-pfgz
summary glibc: nscd client crash on x86_64 under high nscd load
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3904.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3904.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3904
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.0188
published_at 2026-04-11T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02319
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02594
published_at 2026-04-02T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02608
published_at 2026-04-04T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02611
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02616
published_at 2026-04-08T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02635
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02329
published_at 2026-04-12T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02327
published_at 2026-04-13T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02313
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3904
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033931
reference_id 1033931
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033931
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446533
reference_id 2446533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446533
5
reference_url https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0004;hb=HEAD
reference_id GLIBC-SA-2026-0004;hb=HEAD
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/
url https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0004;hb=HEAD
6
reference_url https://sourceware.org/git/?p=glibc.git;a=commit;h=8804157ad9da39631703b92315460808eac86b0c
reference_id ?p=glibc.git;a=commit;h=8804157ad9da39631703b92315460808eac86b0c
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/
url https://sourceware.org/git/?p=glibc.git;a=commit;h=8804157ad9da39631703b92315460808eac86b0c
7
reference_url https://sourceware.org/git/?p=glibc.git;a=commit;h=b712be52645282c706a5faa038242504feb06db5
reference_id ?p=glibc.git;a=commit;h=b712be52645282c706a5faa038242504feb06db5
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/
url https://sourceware.org/git/?p=glibc.git;a=commit;h=b712be52645282c706a5faa038242504feb06db5
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29863
reference_id show_bug.cgi?id=29863
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29863
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9?distro=trixie
purl pkg:deb/debian/glibc@2.36-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2026-3904
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt2t-g9ge-pfgz
86
url VCID-mt93-6b2q-1faf
vulnerability_id VCID-mt93-6b2q-1faf
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0235
reference_id
reference_type
scores
0
value 0.8487
scoring_system epss
scoring_elements 0.99349
published_at 2026-04-16T12:55:00Z
1
value 0.8487
scoring_system epss
scoring_elements 0.99347
published_at 2026-04-13T12:55:00Z
2
value 0.8487
scoring_system epss
scoring_elements 0.9935
published_at 2026-04-18T12:55:00Z
3
value 0.86662
scoring_system epss
scoring_elements 0.9942
published_at 2026-04-11T12:55:00Z
4
value 0.86662
scoring_system epss
scoring_elements 0.99416
published_at 2026-04-01T12:55:00Z
5
value 0.86662
scoring_system epss
scoring_elements 0.99415
published_at 2026-04-02T12:55:00Z
6
value 0.86662
scoring_system epss
scoring_elements 0.99417
published_at 2026-04-04T12:55:00Z
7
value 0.86966
scoring_system epss
scoring_elements 0.99432
published_at 2026-04-09T12:55:00Z
8
value 0.86966
scoring_system epss
scoring_elements 0.99431
published_at 2026-04-08T12:55:00Z
9
value 0.86966
scoring_system epss
scoring_elements 0.9943
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1183461
reference_id 1183461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1183461
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py
reference_id CVE-2015-0235;OSVDB-117579
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb
reference_id CVE-2015-0235;OSVDB-117579
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb
9
reference_url https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
reference_id CVE-2015-0235;OSVDB-117579
reference_type exploit
scores
url https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
10
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
11
reference_url https://access.redhat.com/errata/RHSA-2015:0090
reference_id RHSA-2015:0090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0090
12
reference_url https://access.redhat.com/errata/RHSA-2015:0092
reference_id RHSA-2015:0092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0092
13
reference_url https://access.redhat.com/errata/RHSA-2015:0099
reference_id RHSA-2015:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0099
14
reference_url https://access.redhat.com/errata/RHSA-2015:0101
reference_id RHSA-2015:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0101
15
reference_url https://access.redhat.com/errata/RHSA-2015:0126
reference_id RHSA-2015:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0126
16
reference_url https://usn.ubuntu.com/2485-1/
reference_id USN-2485-1
reference_type
scores
url https://usn.ubuntu.com/2485-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.18-1?distro=trixie
purl pkg:deb/debian/glibc@2.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.18-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-0235
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf
87
url VCID-mxa4-rpev-nkhw
vulnerability_id VCID-mxa4-rpev-nkhw
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0403.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0403
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.1533
published_at 2026-04-18T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15493
published_at 2026-04-01T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15534
published_at 2026-04-02T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15605
published_at 2026-04-04T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15407
published_at 2026-04-07T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15494
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15544
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15508
published_at 2026-04-11T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-12T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15404
published_at 2026-04-13T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15325
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0403
2
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435
4
reference_url http://www.redhat.com/support/errata/RHSA-2005-293.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-293.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617522
reference_id 1617522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617522
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0403
reference_id CVE-2005-0403
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-0403
11
reference_url https://access.redhat.com/errata/RHSA-2005:293
reference_id RHSA-2005:293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:293
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2005-0403
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxa4-rpev-nkhw
88
url VCID-nfe7-dpqx-skfd
vulnerability_id VCID-nfe7-dpqx-skfd
summary glibc: glibc in Fedora 41 ships a broken getrandom/arc4random for ppc64le platform
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12455.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12455.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2332111
reference_id 2332111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2332111
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2024-12455
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfe7-dpqx-skfd
89
url VCID-nj37-pefw-rfbt
vulnerability_id VCID-nj37-pefw-rfbt
summary pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.
references
0
reference_url http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403
reference_id
reference_type
scores
url http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403
1
reference_url http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958
reference_id
reference_type
scores
url http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958
2
reference_url http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html
reference_id
reference_type
scores
url http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2856
reference_id
reference_type
scores
0
value 0.00684
scoring_system epss
scoring_elements 0.71703
published_at 2026-04-18T12:55:00Z
1
value 0.00684
scoring_system epss
scoring_elements 0.71697
published_at 2026-04-16T12:55:00Z
2
value 0.00684
scoring_system epss
scoring_elements 0.71617
published_at 2026-04-01T12:55:00Z
3
value 0.00684
scoring_system epss
scoring_elements 0.71623
published_at 2026-04-02T12:55:00Z
4
value 0.00684
scoring_system epss
scoring_elements 0.71641
published_at 2026-04-04T12:55:00Z
5
value 0.00684
scoring_system epss
scoring_elements 0.71614
published_at 2026-04-07T12:55:00Z
6
value 0.00684
scoring_system epss
scoring_elements 0.71654
published_at 2026-04-08T12:55:00Z
7
value 0.00684
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-09T12:55:00Z
8
value 0.00684
scoring_system epss
scoring_elements 0.71688
published_at 2026-04-11T12:55:00Z
9
value 0.00684
scoring_system epss
scoring_elements 0.71672
published_at 2026-04-12T12:55:00Z
10
value 0.00684
scoring_system epss
scoring_elements 0.71653
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856
5
reference_url http://www.openwall.com/lists/oss-security/2016/02/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/23/3
6
reference_url http://www.openwall.com/lists/oss-security/2016/03/07/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/03/07/2
7
reference_url http://www.securityfocus.com/bid/84601
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84601
8
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
9
reference_url http://www.ubuntu.com/usn/USN-2985-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-2
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt
reference_id CVE-2016-2856
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2856
reference_id CVE-2016-2856
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2856
17
reference_url http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/
reference_id CVE-2016-2856
reference_type exploit
scores
url http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/
18
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-2856
risk_score 10.0
exploitability 2.0
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj37-pefw-rfbt
90
url VCID-njhs-qxym-mbdf
vulnerability_id VCID-njhs-qxym-mbdf
summary
Multiple vulnerabilities were found in glibc, the worst of which allowing
    local attackers to execute arbitrary code as root.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4881.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4881
reference_id
reference_type
scores
0
value 0.00604
scoring_system epss
scoring_elements 0.69633
published_at 2026-04-18T12:55:00Z
1
value 0.00604
scoring_system epss
scoring_elements 0.6952
published_at 2026-04-01T12:55:00Z
2
value 0.00604
scoring_system epss
scoring_elements 0.69531
published_at 2026-04-02T12:55:00Z
3
value 0.00604
scoring_system epss
scoring_elements 0.69546
published_at 2026-04-04T12:55:00Z
4
value 0.00604
scoring_system epss
scoring_elements 0.69525
published_at 2026-04-07T12:55:00Z
5
value 0.00604
scoring_system epss
scoring_elements 0.69575
published_at 2026-04-08T12:55:00Z
6
value 0.00604
scoring_system epss
scoring_elements 0.69592
published_at 2026-04-09T12:55:00Z
7
value 0.00604
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-11T12:55:00Z
8
value 0.00604
scoring_system epss
scoring_elements 0.69599
published_at 2026-04-12T12:55:00Z
9
value 0.00604
scoring_system epss
scoring_elements 0.69585
published_at 2026-04-13T12:55:00Z
10
value 0.00604
scoring_system epss
scoring_elements 0.69624
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4881
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881
3
reference_url http://security.gentoo.org/glsa/glsa-201011-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201011-01.xml
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/59241
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/59241
5
reference_url http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600
reference_id
reference_type
scores
url http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600
6
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=153aa31b93be22e01b236375fb02a9f9b9a0195f
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=153aa31b93be22e01b236375fb02a9f9b9a0195f
7
reference_url http://www.debian.org/security/2010/dsa-2058
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2058
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=599095
reference_id 599095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=599095
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-4881
reference_id CVE-2009-4881
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-4881
57
reference_url https://security.gentoo.org/glsa/201011-01
reference_id GLSA-201011-01
reference_type
scores
url https://security.gentoo.org/glsa/201011-01
fixed_packages
0
url pkg:deb/debian/glibc@2.11.1-1?distro=trixie
purl pkg:deb/debian/glibc@2.11.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.1-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2009-4881
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njhs-qxym-mbdf
91
url VCID-nk5x-uhcf-7kan
vulnerability_id VCID-nk5x-uhcf-7kan
summary glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43396
reference_id
reference_type
scores
0
value 0.00597
scoring_system epss
scoring_elements 0.69418
published_at 2026-04-18T12:55:00Z
1
value 0.00597
scoring_system epss
scoring_elements 0.69407
published_at 2026-04-16T12:55:00Z
2
value 0.00597
scoring_system epss
scoring_elements 0.69299
published_at 2026-04-01T12:55:00Z
3
value 0.00597
scoring_system epss
scoring_elements 0.69311
published_at 2026-04-02T12:55:00Z
4
value 0.00597
scoring_system epss
scoring_elements 0.69329
published_at 2026-04-04T12:55:00Z
5
value 0.00597
scoring_system epss
scoring_elements 0.69309
published_at 2026-04-07T12:55:00Z
6
value 0.00597
scoring_system epss
scoring_elements 0.69359
published_at 2026-04-08T12:55:00Z
7
value 0.00597
scoring_system epss
scoring_elements 0.69376
published_at 2026-04-09T12:55:00Z
8
value 0.00597
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-11T12:55:00Z
9
value 0.00597
scoring_system epss
scoring_elements 0.69383
published_at 2026-04-12T12:55:00Z
10
value 0.00597
scoring_system epss
scoring_elements 0.69369
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2020652
reference_id 2020652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2020652
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622
reference_id 998622
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622
6
reference_url https://security.archlinux.org/AVG-1621
reference_id AVG-1621
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1621
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.32-5?distro=trixie
purl pkg:deb/debian/glibc@2.32-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.32-5%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-43396
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan
92
url VCID-nrvz-y7zn-6bgu
vulnerability_id VCID-nrvz-y7zn-6bgu
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4788
reference_id
reference_type
scores
0
value 0.0756
scoring_system epss
scoring_elements 0.9179
published_at 2026-04-01T12:55:00Z
1
value 0.0756
scoring_system epss
scoring_elements 0.91799
published_at 2026-04-02T12:55:00Z
2
value 0.0756
scoring_system epss
scoring_elements 0.91804
published_at 2026-04-04T12:55:00Z
3
value 0.0756
scoring_system epss
scoring_elements 0.91813
published_at 2026-04-07T12:55:00Z
4
value 0.0756
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-08T12:55:00Z
5
value 0.0756
scoring_system epss
scoring_elements 0.91832
published_at 2026-04-09T12:55:00Z
6
value 0.0756
scoring_system epss
scoring_elements 0.91835
published_at 2026-04-11T12:55:00Z
7
value 0.0756
scoring_system epss
scoring_elements 0.91837
published_at 2026-04-12T12:55:00Z
8
value 0.0756
scoring_system epss
scoring_elements 0.91833
published_at 2026-04-13T12:55:00Z
9
value 0.0756
scoring_system epss
scoring_elements 0.91853
published_at 2026-04-16T12:55:00Z
10
value 0.0756
scoring_system epss
scoring_elements 0.9185
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178
reference_id 717178
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=985625
reference_id 985625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=985625
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c
reference_id CVE-2013-4788;OSVDB-95392
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c
6
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
fixed_packages
0
url pkg:deb/debian/glibc@2.17-94?distro=trixie
purl pkg:deb/debian/glibc@2.17-94?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-4788
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrvz-y7zn-6bgu
93
url VCID-nwfb-xnks-1kg7
vulnerability_id VCID-nwfb-xnks-1kg7
summary glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4438.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4438
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07331
published_at 2026-04-08T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07359
published_at 2026-04-09T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08485
published_at 2026-04-07T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08511
published_at 2026-04-02T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08566
published_at 2026-04-04T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08593
published_at 2026-04-18T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08731
published_at 2026-04-12T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08716
published_at 2026-04-13T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08605
published_at 2026-04-16T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08753
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4438
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131887
reference_id 1131887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131887
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449783
reference_id 2449783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449783
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=34015
reference_id show_bug.cgi?id=34015
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-23T15:06:13Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=34015
fixed_packages
0
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2026-4438
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfb-xnks-1kg7
94
url VCID-pnk4-ss5m-d3an
vulnerability_id VCID-pnk4-ss5m-d3an
summary glibc: calloc may return non-zero memory
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-0176.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0176.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5229.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5229.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5229
reference_id
reference_type
scores
0
value 0.01
scoring_system epss
scoring_elements 0.77027
published_at 2026-04-18T12:55:00Z
1
value 0.01
scoring_system epss
scoring_elements 0.76984
published_at 2026-04-13T12:55:00Z
2
value 0.01
scoring_system epss
scoring_elements 0.77025
published_at 2026-04-16T12:55:00Z
3
value 0.01
scoring_system epss
scoring_elements 0.76921
published_at 2026-04-01T12:55:00Z
4
value 0.01
scoring_system epss
scoring_elements 0.76928
published_at 2026-04-02T12:55:00Z
5
value 0.01
scoring_system epss
scoring_elements 0.76957
published_at 2026-04-04T12:55:00Z
6
value 0.01
scoring_system epss
scoring_elements 0.76939
published_at 2026-04-07T12:55:00Z
7
value 0.01
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-08T12:55:00Z
8
value 0.01
scoring_system epss
scoring_elements 0.76983
published_at 2026-04-09T12:55:00Z
9
value 0.01
scoring_system epss
scoring_elements 0.7701
published_at 2026-04-11T12:55:00Z
10
value 0.01
scoring_system epss
scoring_elements 0.76989
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5229
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1246713
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1246713
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1293976
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1293976
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10150
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10150
7
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
8
reference_url http://www.securityfocus.com/bid/84172
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84172
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1256285
reference_id 1256285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1256285
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5229
reference_id CVE-2015-5229
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-5229
20
reference_url https://access.redhat.com/errata/RHSA-2016:0176
reference_id RHSA-2016:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0176
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-5229
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnk4-ss5m-d3an
95
url VCID-ppaj-d4b9-wuhf
vulnerability_id VCID-ppaj-d4b9-wuhf
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1781
reference_id
reference_type
scores
0
value 0.07304
scoring_system epss
scoring_elements 0.91636
published_at 2026-04-01T12:55:00Z
1
value 0.07304
scoring_system epss
scoring_elements 0.91643
published_at 2026-04-02T12:55:00Z
2
value 0.07304
scoring_system epss
scoring_elements 0.91649
published_at 2026-04-04T12:55:00Z
3
value 0.07304
scoring_system epss
scoring_elements 0.91657
published_at 2026-04-07T12:55:00Z
4
value 0.07304
scoring_system epss
scoring_elements 0.9167
published_at 2026-04-08T12:55:00Z
5
value 0.07304
scoring_system epss
scoring_elements 0.91677
published_at 2026-04-09T12:55:00Z
6
value 0.07304
scoring_system epss
scoring_elements 0.9168
published_at 2026-04-11T12:55:00Z
7
value 0.07304
scoring_system epss
scoring_elements 0.91682
published_at 2026-04-12T12:55:00Z
8
value 0.07304
scoring_system epss
scoring_elements 0.91679
published_at 2026-04-13T12:55:00Z
9
value 0.07304
scoring_system epss
scoring_elements 0.917
published_at 2026-04-16T12:55:00Z
10
value 0.07304
scoring_system epss
scoring_elements 0.91692
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1199525
reference_id 1199525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1199525
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105
reference_id 796105
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105
11
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
12
reference_url https://access.redhat.com/errata/RHSA-2015:0863
reference_id RHSA-2015:0863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0863
13
reference_url https://access.redhat.com/errata/RHSA-2015:2199
reference_id RHSA-2015:2199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2199
14
reference_url https://access.redhat.com/errata/RHSA-2015:2589
reference_id RHSA-2015:2589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2589
15
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-20?distro=trixie
purl pkg:deb/debian/glibc@2.19-20?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-20%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-1781
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ppaj-d4b9-wuhf
96
url VCID-pw6m-42j9-f7af
vulnerability_id VCID-pw6m-42j9-f7af
summary Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3998.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3998
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41903
published_at 2026-04-16T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41794
published_at 2026-04-01T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41859
published_at 2026-04-02T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41888
published_at 2026-04-04T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41817
published_at 2026-04-07T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41866
published_at 2026-04-08T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41876
published_at 2026-04-18T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.419
published_at 2026-04-11T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41865
published_at 2026-04-12T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41853
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3998
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024633
reference_id 2024633
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2024633
4
reference_url https://www.openwall.com/lists/oss-security/2022/01/24/4
reference_id 4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://www.openwall.com/lists/oss-security/2022/01/24/4
5
reference_url https://security.archlinux.org/AVG-1621
reference_id AVG-1621
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1621
6
reference_url https://access.redhat.com/security/cve/CVE-2021-3998
reference_id CVE-2021-3998
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://access.redhat.com/security/cve/CVE-2021-3998
7
reference_url https://security-tracker.debian.org/tracker/CVE-2021-3998
reference_id CVE-2021-3998
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://security-tracker.debian.org/tracker/CVE-2021-3998
8
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03
reference_id gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03
9
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb
reference_id gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb
10
reference_url https://security.gentoo.org/glsa/202208-24
reference_id GLSA-202208-24
reference_type
scores
url https://security.gentoo.org/glsa/202208-24
11
reference_url https://security.netapp.com/advisory/ntap-20221020-0003/
reference_id ntap-20221020-0003
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://security.netapp.com/advisory/ntap-20221020-0003/
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=28770
reference_id show_bug.cgi?id=28770
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=28770
13
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.33-4?distro=trixie
purl pkg:deb/debian/glibc@2.33-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-4%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-3998
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pw6m-42j9-f7af
97
url VCID-pyms-pya1-buck
vulnerability_id VCID-pyms-pya1-buck
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1751
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33535
published_at 2026-04-01T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33687
published_at 2026-04-02T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33719
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33558
published_at 2026-04-07T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33601
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33634
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.3363
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33589
published_at 2026-04-12T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33566
published_at 2026-04-13T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33599
published_at 2026-04-16T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1810719
reference_id 1810719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1810719
5
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
6
reference_url https://access.redhat.com/errata/RHSA-2020:4444
reference_id RHSA-2020:4444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4444
7
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.30-3?distro=trixie
purl pkg:deb/debian/glibc@2.30-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.30-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2020-1751
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyms-pya1-buck
98
url VCID-pz43-weh8-cqgj
vulnerability_id VCID-pz43-weh8-cqgj
summary glibc: Vector register overwrite bug in glibc
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5702.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5702.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5702
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.52452
published_at 2026-04-02T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52556
published_at 2026-04-18T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52528
published_at 2026-04-12T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.52512
published_at 2026-04-13T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52551
published_at 2026-04-16T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.5248
published_at 2026-04-04T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.52447
published_at 2026-04-07T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.52499
published_at 2026-04-08T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52493
published_at 2026-04-09T12:55:00Z
9
value 0.00291
scoring_system epss
scoring_elements 0.52544
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5702
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107365
reference_id 1107365
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107365
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370472
reference_id 2370472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370472
5
reference_url https://access.redhat.com/errata/RHSA-2025:11066
reference_id RHSA-2025:11066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11066
6
reference_url https://access.redhat.com/errata/RHSA-2025:11487
reference_id RHSA-2025:11487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11487
7
reference_url https://access.redhat.com/errata/RHSA-2025:9877
reference_id RHSA-2025:9877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9877
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33056
reference_id show_bug.cgi?id=33056
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T20:17:18Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33056
9
reference_url https://usn.ubuntu.com/7634-1/
reference_id USN-7634-1
reference_type
scores
url https://usn.ubuntu.com/7634-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-9?distro=trixie
purl pkg:deb/debian/glibc@2.41-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-9%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2025-5702
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pz43-weh8-cqgj
99
url VCID-q3am-4g9r-rffg
vulnerability_id VCID-q3am-4g9r-rffg
summary glibc: incorrect printf output for integers with thousands separator and width field
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25139.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25139
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.36001
published_at 2026-04-18T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36126
published_at 2026-04-04T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.35962
published_at 2026-04-07T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36011
published_at 2026-04-08T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36035
published_at 2026-04-09T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.3604
published_at 2026-04-11T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36002
published_at 2026-04-12T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.35977
published_at 2026-04-13T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36016
published_at 2026-04-16T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36096
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25139
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2023/02/10/1
reference_id 1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T14:48:30Z/
url http://www.openwall.com/lists/oss-security/2023/02/10/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167666
reference_id 2167666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167666
5
reference_url https://security.archlinux.org/AVG-2833
reference_id AVG-2833
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2833
6
reference_url https://security.netapp.com/advisory/ntap-20230302-0010/
reference_id ntap-20230302-0010
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T14:48:30Z/
url https://security.netapp.com/advisory/ntap-20230302-0010/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=30068
reference_id show_bug.cgi?id=30068
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T14:48:30Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=30068
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-25139
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3am-4g9r-rffg
100
url VCID-q5az-xe7k-m7av
vulnerability_id VCID-q5az-xe7k-m7av
summary glibc: Fragmentation attacks possible when EDNS0 is enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12132
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52657
published_at 2026-04-01T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52803
published_at 2026-04-18T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52758
published_at 2026-04-13T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52795
published_at 2026-04-16T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52702
published_at 2026-04-02T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52729
published_at 2026-04-04T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52694
published_at 2026-04-07T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52745
published_at 2026-04-08T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.5274
published_at 2026-04-09T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.5279
published_at 2026-04-11T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52774
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12132
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477529
reference_id 1477529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477529
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650
reference_id 870650
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650
5
reference_url https://security.archlinux.org/AVG-368
reference_id AVG-368
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-368
6
reference_url https://security.archlinux.org/AVG-369
reference_id AVG-369
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-369
7
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
8
reference_url https://usn.ubuntu.com/5768-1/
reference_id USN-5768-1
reference_type
scores
url https://usn.ubuntu.com/5768-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.25-1?distro=trixie
purl pkg:deb/debian/glibc@2.25-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-12132
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5az-xe7k-m7av
101
url VCID-qaaq-fss4-1kgr
vulnerability_id VCID-qaaq-fss4-1kgr
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6485
reference_id
reference_type
scores
0
value 0.01095
scoring_system epss
scoring_elements 0.77936
published_at 2026-04-01T12:55:00Z
1
value 0.01095
scoring_system epss
scoring_elements 0.77943
published_at 2026-04-02T12:55:00Z
2
value 0.01095
scoring_system epss
scoring_elements 0.77971
published_at 2026-04-04T12:55:00Z
3
value 0.01095
scoring_system epss
scoring_elements 0.77952
published_at 2026-04-07T12:55:00Z
4
value 0.01095
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-08T12:55:00Z
5
value 0.01095
scoring_system epss
scoring_elements 0.77983
published_at 2026-04-09T12:55:00Z
6
value 0.01095
scoring_system epss
scoring_elements 0.7801
published_at 2026-04-11T12:55:00Z
7
value 0.01095
scoring_system epss
scoring_elements 0.77993
published_at 2026-04-12T12:55:00Z
8
value 0.01095
scoring_system epss
scoring_elements 0.77992
published_at 2026-04-13T12:55:00Z
9
value 0.01095
scoring_system epss
scoring_elements 0.78027
published_at 2026-04-16T12:55:00Z
10
value 0.01095
scoring_system epss
scoring_elements 0.78026
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1542102
reference_id 1542102
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1542102
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159
reference_id 878159
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159
6
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
7
reference_url https://access.redhat.com/errata/RHSA-2018:3092
reference_id RHSA-2018:3092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3092
8
reference_url https://usn.ubuntu.com/4218-1/
reference_id USN-4218-1
reference_type
scores
url https://usn.ubuntu.com/4218-1/
9
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.27-1?distro=trixie
purl pkg:deb/debian/glibc@2.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2018-6485
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qaaq-fss4-1kgr
102
url VCID-qeyh-2f6t-bbbb
vulnerability_id VCID-qeyh-2f6t-bbbb
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5156.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5156
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18062
published_at 2026-04-18T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18304
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18144
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18199
published_at 2026-04-09T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18204
published_at 2026-04-11T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18157
published_at 2026-04-12T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18106
published_at 2026-04-13T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18049
published_at 2026-04-16T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18359
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5156
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053002
reference_id 1053002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053002
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240541
reference_id 2240541
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2240541
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-5156
reference_id CVE-2023-5156
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/
url https://access.redhat.com/security/cve/CVE-2023-5156
10
reference_url https://security.gentoo.org/glsa/202402-01
reference_id GLSA-202402-01
reference_type
scores
url https://security.gentoo.org/glsa/202402-01
11
reference_url https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
reference_id ?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/
url https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=30884
reference_id show_bug.cgi?id=30884
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=30884
13
reference_url https://usn.ubuntu.com/6541-1/
reference_id USN-6541-1
reference_type
scores
url https://usn.ubuntu.com/6541-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.37-11?distro=trixie
purl pkg:deb/debian/glibc@2.37-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-11%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-5156
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyh-2f6t-bbbb
103
url VCID-qwx5-bayb-bkcg
vulnerability_id VCID-qwx5-bayb-bkcg
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6551
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.61605
published_at 2026-04-01T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61679
published_at 2026-04-02T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.6171
published_at 2026-04-04T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61681
published_at 2026-04-07T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-08T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.61745
published_at 2026-04-09T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61767
published_at 2026-04-11T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61754
published_at 2026-04-12T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61735
published_at 2026-04-13T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61776
published_at 2026-04-16T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.61782
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1542119
reference_id 1542119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1542119
4
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
fixed_packages
0
url pkg:deb/debian/glibc@2.27-1?distro=trixie
purl pkg:deb/debian/glibc@2.27-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2018-6551
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwx5-bayb-bkcg
104
url VCID-r44h-gkxy-8kh2
vulnerability_id VCID-r44h-gkxy-8kh2
summary security update
references
0
reference_url http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
reference_id
reference_type
scores
url http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
10
reference_url http://marc.info/?l=bugtraq&m=145596041017029&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145596041017029&w=2
11
reference_url http://marc.info/?l=bugtraq&m=145672440608228&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145672440608228&w=2
12
reference_url http://marc.info/?l=bugtraq&m=145690841819314&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145690841819314&w=2
13
reference_url http://marc.info/?l=bugtraq&m=145857691004892&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145857691004892&w=2
14
reference_url http://marc.info/?l=bugtraq&m=146161017210491&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=146161017210491&w=2
15
reference_url http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
16
reference_url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
17
reference_url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
18
reference_url http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0175.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0175.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0176.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0176.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0225.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0225.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-0277.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0277.html
23
reference_url https://access.redhat.com/articles/2161461
reference_id
reference_type
scores
url https://access.redhat.com/articles/2161461
24
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json
25
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7547
reference_id
reference_type
scores
0
value 0.93908
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-04T12:55:00Z
1
value 0.93908
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-01T12:55:00Z
2
value 0.93952
scoring_system epss
scoring_elements 0.99885
published_at 2026-04-18T12:55:00Z
3
value 0.93952
scoring_system epss
scoring_elements 0.99883
published_at 2026-04-12T12:55:00Z
4
value 0.93952
scoring_system epss
scoring_elements 0.99884
published_at 2026-04-16T12:55:00Z
5
value 0.93952
scoring_system epss
scoring_elements 0.99882
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7547
26
reference_url https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
reference_id
reference_type
scores
url https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
27
reference_url https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
reference_id
reference_type
scores
url https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
28
reference_url https://bto.bluecoat.com/security-advisory/sa114
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa114
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
36
reference_url http://seclists.org/fulldisclosure/2019/Sep/7
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Sep/7
37
reference_url http://seclists.org/fulldisclosure/2021/Sep/0
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2021/Sep/0
38
reference_url http://seclists.org/fulldisclosure/2022/Jun/36
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2022/Jun/36
39
reference_url https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
reference_id
reference_type
scores
url https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
40
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
41
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
42
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
43
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
44
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
45
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
46
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
47
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
48
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
49
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
50
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
51
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
52
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
53
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
54
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
55
reference_url https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
56
reference_url https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
reference_id
reference_type
scores
url https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
57
reference_url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
reference_id
reference_type
scores
url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
58
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10150
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10150
59
reference_url https://seclists.org/bugtraq/2019/Sep/7
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/7
60
reference_url https://security.netapp.com/advisory/ntap-20160217-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160217-0002/
61
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18665
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=18665
62
reference_url https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
reference_id
reference_type
scores
url https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
63
reference_url https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
reference_id
reference_type
scores
url https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
64
reference_url https://support.lenovo.com/us/en/product_security/len_5450
reference_id
reference_type
scores
url https://support.lenovo.com/us/en/product_security/len_5450
65
reference_url http://support.citrix.com/article/CTX206991
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX206991
66
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
67
reference_url https://www.exploit-db.com/exploits/39454/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39454/
68
reference_url https://www.exploit-db.com/exploits/40339/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/40339/
69
reference_url https://www.kb.cert.org/vuls/id/457759
reference_id
reference_type
scores
url https://www.kb.cert.org/vuls/id/457759
70
reference_url https://www.tenable.com/security/research/tra-2017-08
reference_id
reference_type
scores
url https://www.tenable.com/security/research/tra-2017-08
71
reference_url http://ubuntu.com/usn/usn-2900-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-2900-1
72
reference_url http://www.debian.org/security/2016/dsa-3480
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3480
73
reference_url http://www.debian.org/security/2016/dsa-3481
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3481
74
reference_url http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
reference_id
reference_type
scores
url http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
75
reference_url http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
reference_id
reference_type
scores
url http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
76
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
77
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
78
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
79
reference_url http://www.securityfocus.com/bid/83265
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83265
80
reference_url http://www.securitytracker.com/id/1035020
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035020
81
reference_url http://www.vmware.com/security/advisories/VMSA-2016-0002.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2016-0002.html
82
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1293532
reference_id 1293532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1293532
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
151
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt
reference_id CVE-2015-7547
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt
152
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py
reference_id CVE-2015-7547
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py
153
reference_url https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
reference_id CVE-2015-7547
reference_type exploit
scores
url https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
154
reference_url https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
reference_id CVE-2015-7547
reference_type exploit
scores
url https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
155
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7547
reference_id CVE-2015-7547
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7547
156
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
157
reference_url https://access.redhat.com/errata/RHSA-2016:0175
reference_id RHSA-2016:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0175
158
reference_url https://access.redhat.com/errata/RHSA-2016:0176
reference_id RHSA-2016:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0176
159
reference_url https://access.redhat.com/errata/RHSA-2016:0225
reference_id RHSA-2016:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0225
160
reference_url https://access.redhat.com/errata/RHSA-2016:0277
reference_id RHSA-2016:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0277
161
reference_url https://usn.ubuntu.com/2900-1/
reference_id USN-2900-1
reference_type
scores
url https://usn.ubuntu.com/2900-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-8?distro=trixie
purl pkg:deb/debian/glibc@2.21-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-7547
risk_score 10.0
exploitability 2.0
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r44h-gkxy-8kh2
105
url VCID-r6kw-vaat-mbav
vulnerability_id VCID-r6kw-vaat-mbav
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1382.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1382
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25052
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25135
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25175
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24947
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25015
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.2506
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25075
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25034
published_at 2026-04-12T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.2498
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24992
published_at 2026-04-16T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24984
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1382
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617410
reference_id 1617410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617410
4
reference_url https://access.redhat.com/errata/RHSA-2005:261
reference_id RHSA-2005:261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:261
fixed_packages
0
url pkg:deb/debian/glibc@2.3.2.ds1-19?distro=trixie
purl pkg:deb/debian/glibc@2.3.2.ds1-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-19%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2004-1382
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r6kw-vaat-mbav
106
url VCID-rp43-q42n-jkh5
vulnerability_id VCID-rp43-q42n-jkh5
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html
1
reference_url http://osvdb.org/84710
reference_id
reference_type
scores
url http://osvdb.org/84710
2
reference_url http://rhn.redhat.com/errata/RHSA-2012-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1207.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2012-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1208.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1262.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1262.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2012-1325.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1325.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3480
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42388
published_at 2026-04-18T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42307
published_at 2026-04-01T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42381
published_at 2026-04-02T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42411
published_at 2026-04-04T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.4235
published_at 2026-04-07T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42399
published_at 2026-04-08T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42407
published_at 2026-04-09T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42429
published_at 2026-04-11T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42393
published_at 2026-04-12T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42364
published_at 2026-04-13T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42413
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3480
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480
9
reference_url http://secunia.com/advisories/50201
reference_id
reference_type
scores
url http://secunia.com/advisories/50201
10
reference_url http://secunia.com/advisories/50422
reference_id
reference_type
scores
url http://secunia.com/advisories/50422
11
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=14459
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=14459
12
reference_url http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html
reference_id
reference_type
scores
url http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html
13
reference_url http://www.openwall.com/lists/oss-security/2012/08/13/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/08/13/4
14
reference_url http://www.openwall.com/lists/oss-security/2012/08/13/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/08/13/6
15
reference_url http://www.securityfocus.com/bid/54982
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54982
16
reference_url http://www.securitytracker.com/id?1027374
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027374
17
reference_url http://www.ubuntu.com/usn/USN-1589-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1589-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=847715
reference_id 847715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=847715
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3480
reference_id CVE-2012-3480
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3480
21
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c
reference_id CVE-2012-3480;OSVDB-84710
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c
22
reference_url https://www.securityfocus.com/bid/54982/info
reference_id CVE-2012-3480;OSVDB-84710
reference_type exploit
scores
url https://www.securityfocus.com/bid/54982/info
23
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
24
reference_url https://access.redhat.com/errata/RHSA-2012:1207
reference_id RHSA-2012:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1207
25
reference_url https://access.redhat.com/errata/RHSA-2012:1208
reference_id RHSA-2012:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1208
26
reference_url https://access.redhat.com/errata/RHSA-2012:1325
reference_id RHSA-2012:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1325
27
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
28
reference_url https://usn.ubuntu.com/1589-2/
reference_id USN-1589-2
reference_type
scores
url https://usn.ubuntu.com/1589-2/
fixed_packages
0
url pkg:deb/debian/glibc@2.13-36?distro=trixie
purl pkg:deb/debian/glibc@2.13-36?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-36%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2012-3480
risk_score 8.2
exploitability 2.0
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rp43-q42n-jkh5
107
url VCID-rq92-5scc-8uc7
vulnerability_id VCID-rq92-5scc-8uc7
summary glibc: De-recursivise regular expression engine
references
0
reference_url http://cxib.net/stuff/proftpd.gnu.c
reference_id
reference_type
scores
url http://cxib.net/stuff/proftpd.gnu.c
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4052.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4052.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4052
reference_id
reference_type
scores
0
value 0.09951
scoring_system epss
scoring_elements 0.93043
published_at 2026-04-18T12:55:00Z
1
value 0.09951
scoring_system epss
scoring_elements 0.93002
published_at 2026-04-01T12:55:00Z
2
value 0.09951
scoring_system epss
scoring_elements 0.93011
published_at 2026-04-02T12:55:00Z
3
value 0.09951
scoring_system epss
scoring_elements 0.93014
published_at 2026-04-07T12:55:00Z
4
value 0.09951
scoring_system epss
scoring_elements 0.93022
published_at 2026-04-08T12:55:00Z
5
value 0.09951
scoring_system epss
scoring_elements 0.93026
published_at 2026-04-09T12:55:00Z
6
value 0.09951
scoring_system epss
scoring_elements 0.93031
published_at 2026-04-11T12:55:00Z
7
value 0.09951
scoring_system epss
scoring_elements 0.93029
published_at 2026-04-12T12:55:00Z
8
value 0.09951
scoring_system epss
scoring_elements 0.9303
published_at 2026-04-13T12:55:00Z
9
value 0.09951
scoring_system epss
scoring_elements 0.9304
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4052
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4052
4
reference_url http://seclists.org/fulldisclosure/2011/Jan/78
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2011/Jan/78
5
reference_url http://secunia.com/advisories/42547
reference_id
reference_type
scores
url http://secunia.com/advisories/42547
6
reference_url http://securityreason.com/achievement_securityalert/93
reference_id
reference_type
scores
url http://securityreason.com/achievement_securityalert/93
7
reference_url http://securitytracker.com/id?1024832
reference_id
reference_type
scores
url http://securitytracker.com/id?1024832
8
reference_url http://www.exploit-db.com/exploits/15935
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15935
9
reference_url http://www.kb.cert.org/vuls/id/912279
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/912279
10
reference_url http://www.securityfocus.com/archive/1/515589/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515589/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/45233
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45233
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645859
reference_id 645859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645859
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
41
reference_url http://securityreason.com/securityalert/8003
reference_id CVE-2010-4051;CVE-2010-4052
reference_type exploit
scores
url http://securityreason.com/securityalert/8003
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4052
reference_id CVE-2010-4052
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4052
43
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35061.c
reference_id CVE-2010-4052;OSVDB-70447
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35061.c
44
reference_url https://www.securityfocus.com/bid/45233/info
reference_id CVE-2010-4052;OSVDB-70447
reference_type exploit
scores
url https://www.securityfocus.com/bid/45233/info
fixed_packages
0
url pkg:deb/debian/glibc@2.19-4?distro=trixie
purl pkg:deb/debian/glibc@2.19-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2010-4052
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rq92-5scc-8uc7
108
url VCID-rqh3-5xc2-uyab
vulnerability_id VCID-rqh3-5xc2-uyab
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
reference_id
reference_type
scores
0
value 0.07617
scoring_system epss
scoring_elements 0.91821
published_at 2026-04-01T12:55:00Z
1
value 0.07617
scoring_system epss
scoring_elements 0.91877
published_at 2026-04-18T12:55:00Z
2
value 0.07617
scoring_system epss
scoring_elements 0.91862
published_at 2026-04-13T12:55:00Z
3
value 0.07617
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-11T12:55:00Z
4
value 0.07617
scoring_system epss
scoring_elements 0.91866
published_at 2026-04-12T12:55:00Z
5
value 0.07617
scoring_system epss
scoring_elements 0.91881
published_at 2026-04-16T12:55:00Z
6
value 0.07617
scoring_system epss
scoring_elements 0.91829
published_at 2026-04-02T12:55:00Z
7
value 0.07617
scoring_system epss
scoring_elements 0.91835
published_at 2026-04-04T12:55:00Z
8
value 0.07617
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-07T12:55:00Z
9
value 0.07617
scoring_system epss
scoring_elements 0.91856
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452543
reference_id 1452543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452543
5
reference_url https://security.archlinux.org/ASA-201706-22
reference_id ASA-201706-22
reference_type
scores
url https://security.archlinux.org/ASA-201706-22
6
reference_url https://security.archlinux.org/ASA-201706-23
reference_id ASA-201706-23
reference_type
scores
url https://security.archlinux.org/ASA-201706-23
7
reference_url https://security.archlinux.org/AVG-307
reference_id AVG-307
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-307
8
reference_url https://security.archlinux.org/AVG-308
reference_id AVG-308
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-308
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c
reference_id CVE-2017-1000370;CVE-2017-1000366
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c
10
reference_url https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c
reference_id CVE-2017-1000370;CVE-2017-1000366
reference_type exploit
scores
url https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c
reference_id CVE-2017-1000371;CVE-2017-1000366
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c
12
reference_url https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c
reference_id CVE-2017-1000371;CVE-2017-1000366
reference_type exploit
scores
url https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c
reference_id CVE-2017-1000379;CVE-2017-1000366
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c
14
reference_url https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
reference_id CVE-2017-1000379;CVE-2017-1000366
reference_type exploit
scores
url https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
15
reference_url https://security.gentoo.org/glsa/201706-19
reference_id GLSA-201706-19
reference_type
scores
url https://security.gentoo.org/glsa/201706-19
16
reference_url https://access.redhat.com/errata/RHSA-2017:1479
reference_id RHSA-2017:1479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1479
17
reference_url https://access.redhat.com/errata/RHSA-2017:1480
reference_id RHSA-2017:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1480
18
reference_url https://access.redhat.com/errata/RHSA-2017:1481
reference_id RHSA-2017:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1481
19
reference_url https://access.redhat.com/errata/RHSA-2017:1567
reference_id RHSA-2017:1567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1567
20
reference_url https://usn.ubuntu.com/3323-1/
reference_id USN-3323-1
reference_type
scores
url https://usn.ubuntu.com/3323-1/
21
reference_url https://usn.ubuntu.com/3323-2/
reference_id USN-3323-2
reference_type
scores
url https://usn.ubuntu.com/3323-2/
fixed_packages
0
url pkg:deb/debian/glibc@2.24-12?distro=trixie
purl pkg:deb/debian/glibc@2.24-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-12%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-1000366
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rqh3-5xc2-uyab
109
url VCID-rt4z-2rd4-qfde
vulnerability_id VCID-rt4z-2rd4-qfde
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6488
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35327
published_at 2026-04-01T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35478
published_at 2026-04-18T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35449
published_at 2026-04-13T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35489
published_at 2026-04-16T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35526
published_at 2026-04-02T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35552
published_at 2026-04-04T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35434
published_at 2026-04-07T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.3548
published_at 2026-04-08T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35505
published_at 2026-04-09T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35514
published_at 2026-04-11T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35471
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24097
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24097
4
reference_url http://www.securityfocus.com/bid/106671
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106671
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1667931
reference_id 1667931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1667931
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6488
reference_id CVE-2019-6488
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6488
8
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
fixed_packages
0
url pkg:deb/debian/glibc@2.28-6?distro=trixie
purl pkg:deb/debian/glibc@2.28-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-6%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2019-6488
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rt4z-2rd4-qfde
110
url VCID-ru1q-qgq2-h7ct
vulnerability_id VCID-ru1q-qgq2-h7ct
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2017-0680.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0680.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8776
reference_id
reference_type
scores
0
value 0.05306
scoring_system epss
scoring_elements 0.90044
published_at 2026-04-18T12:55:00Z
1
value 0.07412
scoring_system epss
scoring_elements 0.91702
published_at 2026-04-01T12:55:00Z
2
value 0.07412
scoring_system epss
scoring_elements 0.91743
published_at 2026-04-13T12:55:00Z
3
value 0.07412
scoring_system epss
scoring_elements 0.91764
published_at 2026-04-16T12:55:00Z
4
value 0.07412
scoring_system epss
scoring_elements 0.9171
published_at 2026-04-02T12:55:00Z
5
value 0.07412
scoring_system epss
scoring_elements 0.91715
published_at 2026-04-04T12:55:00Z
6
value 0.07412
scoring_system epss
scoring_elements 0.91723
published_at 2026-04-07T12:55:00Z
7
value 0.07412
scoring_system epss
scoring_elements 0.91735
published_at 2026-04-08T12:55:00Z
8
value 0.07412
scoring_system epss
scoring_elements 0.91742
published_at 2026-04-09T12:55:00Z
9
value 0.07412
scoring_system epss
scoring_elements 0.91745
published_at 2026-04-11T12:55:00Z
10
value 0.07412
scoring_system epss
scoring_elements 0.91747
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8776
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
16
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18985
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=18985
17
reference_url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
reference_id
reference_type
scores
url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
18
reference_url http://www.debian.org/security/2016/dsa-3480
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3480
19
reference_url http://www.debian.org/security/2016/dsa-3481
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3481
20
reference_url http://www.openwall.com/lists/oss-security/2016/01/19/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/19/11
21
reference_url http://www.openwall.com/lists/oss-security/2016/01/20/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/20/1
22
reference_url http://www.securityfocus.com/bid/83277
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83277
23
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
24
reference_url http://www.ubuntu.com/usn/USN-2985-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-2
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1300299
reference_id 1300299
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1300299
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445
reference_id 812445
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8776
reference_id CVE-2015-8776
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8776
52
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
53
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
54
reference_url https://access.redhat.com/errata/RHSA-2017:0680
reference_id RHSA-2017:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0680
55
reference_url https://access.redhat.com/errata/RHSA-2017:1916
reference_id RHSA-2017:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1916
56
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-7?distro=trixie
purl pkg:deb/debian/glibc@2.21-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-7%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8776
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ru1q-qgq2-h7ct
111
url VCID-sbzq-gp2e-v7fy
vulnerability_id VCID-sbzq-gp2e-v7fy
summary
Multiple vulnerabilities in glibc could result in Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-25013
reference_id
reference_type
scores
0
value 0.00805
scoring_system epss
scoring_elements 0.74084
published_at 2026-04-01T12:55:00Z
1
value 0.00805
scoring_system epss
scoring_elements 0.74179
published_at 2026-04-18T12:55:00Z
2
value 0.00805
scoring_system epss
scoring_elements 0.74088
published_at 2026-04-07T12:55:00Z
3
value 0.00805
scoring_system epss
scoring_elements 0.74116
published_at 2026-04-04T12:55:00Z
4
value 0.00805
scoring_system epss
scoring_elements 0.7409
published_at 2026-04-02T12:55:00Z
5
value 0.00805
scoring_system epss
scoring_elements 0.74171
published_at 2026-04-16T12:55:00Z
6
value 0.00805
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-13T12:55:00Z
7
value 0.00805
scoring_system epss
scoring_elements 0.74139
published_at 2026-04-12T12:55:00Z
8
value 0.00805
scoring_system epss
scoring_elements 0.74157
published_at 2026-04-11T12:55:00Z
9
value 0.00805
scoring_system epss
scoring_elements 0.74136
published_at 2026-04-09T12:55:00Z
10
value 0.00805
scoring_system epss
scoring_elements 0.74121
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-25013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1912960
reference_id 1912960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1912960
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
reference_id 4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273
reference_id 979273
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273
7
reference_url https://security.archlinux.org/ASA-202102-16
reference_id ASA-202102-16
reference_type
scores
url https://security.archlinux.org/ASA-202102-16
8
reference_url https://security.archlinux.org/ASA-202102-17
reference_id ASA-202102-17
reference_type
scores
url https://security.archlinux.org/ASA-202102-17
9
reference_url https://security.archlinux.org/AVG-1320
reference_id AVG-1320
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1320
10
reference_url https://security.gentoo.org/glsa/202107-07
reference_id GLSA-202107-07
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://security.gentoo.org/glsa/202107-07
11
reference_url https://security.netapp.com/advisory/ntap-20210205-0004/
reference_id ntap-20210205-0004
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://security.netapp.com/advisory/ntap-20210205-0004/
12
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b
reference_id ?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b
13
reference_url https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E
reference_id r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E
reference_id r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E
reference_id r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E
reference_id r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E
reference_id r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E
reference_id r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E
reference_id r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E
reference_id rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E
21
reference_url https://access.redhat.com/errata/RHSA-2021:0348
reference_id RHSA-2021:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0348
22
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
23
reference_url https://access.redhat.com/errata/RHSA-2021:1585
reference_id RHSA-2021:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1585
24
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24973
reference_id show_bug.cgi?id=24973
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=24973
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
reference_id TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
26
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
27
reference_url https://usn.ubuntu.com/5768-1/
reference_id USN-5768-1
reference_type
scores
url https://usn.ubuntu.com/5768-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-9?distro=trixie
purl pkg:deb/debian/glibc@2.31-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2019-25013
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbzq-gp2e-v7fy
112
url VCID-sjav-8bub-eycz
vulnerability_id VCID-sjav-8bub-eycz
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2961
reference_id
reference_type
scores
0
value 0.92156
scoring_system epss
scoring_elements 0.99712
published_at 2026-04-18T12:55:00Z
1
value 0.92156
scoring_system epss
scoring_elements 0.99707
published_at 2026-04-04T12:55:00Z
2
value 0.92156
scoring_system epss
scoring_elements 0.99709
published_at 2026-04-09T12:55:00Z
3
value 0.92156
scoring_system epss
scoring_elements 0.9971
published_at 2026-04-13T12:55:00Z
4
value 0.92156
scoring_system epss
scoring_elements 0.99711
published_at 2026-04-16T12:55:00Z
5
value 0.92578
scoring_system epss
scoring_elements 0.99739
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2961
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/1
reference_id 1
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191
reference_id 1069191
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191
6
reference_url http://www.openwall.com/lists/oss-security/2024/04/24/2
reference_id 2
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/04/24/2
7
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/2
reference_id 2
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/2
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2273404
reference_id 2273404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2273404
9
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/3
reference_id 3
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/3
10
reference_url http://www.openwall.com/lists/oss-security/2024/04/18/4
reference_id 4
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/04/18/4
11
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/4
reference_id 4
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/4
12
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/5
reference_id 5
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/5
13
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
14
reference_url http://www.openwall.com/lists/oss-security/2024/05/27/6
reference_id 6
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/05/27/6
15
reference_url http://www.openwall.com/lists/oss-security/2024/04/17/9
reference_id 9
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url http://www.openwall.com/lists/oss-security/2024/04/17/9
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
reference_id BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
17
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
reference_id GLIBC-SA-2024-0004
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
18
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
19
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
20
reference_url https://security.netapp.com/advisory/ntap-20240531-0002/
reference_id ntap-20240531-0002
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://security.netapp.com/advisory/ntap-20240531-0002/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
reference_id P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
22
reference_url https://access.redhat.com/errata/RHSA-2024:2722
reference_id RHSA-2024:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2722
23
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
24
reference_url https://access.redhat.com/errata/RHSA-2024:3269
reference_id RHSA-2024:3269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3269
25
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
26
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
27
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
28
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
29
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
30
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
31
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
32
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
33
reference_url https://access.redhat.com/errata/RHSA-2024:7590
reference_id RHSA-2024:7590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7590
34
reference_url https://access.redhat.com/errata/RHSA-2024:7594
reference_id RHSA-2024:7594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7594
35
reference_url https://access.redhat.com/errata/RHSA-2024:7599
reference_id RHSA-2024:7599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7599
36
reference_url https://access.redhat.com/errata/RHSA-2024:7939
reference_id RHSA-2024:7939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7939
37
reference_url https://access.redhat.com/errata/RHSA-2024:8235
reference_id RHSA-2024:8235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8235
38
reference_url https://usn.ubuntu.com/6737-1/
reference_id USN-6737-1
reference_type
scores
url https://usn.ubuntu.com/6737-1/
39
reference_url https://usn.ubuntu.com/6737-2/
reference_id USN-6737-2
reference_type
scores
url https://usn.ubuntu.com/6737-2/
40
reference_url https://usn.ubuntu.com/6762-1/
reference_id USN-6762-1
reference_type
scores
url https://usn.ubuntu.com/6762-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
reference_id YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u9%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-18?distro=trixie
purl pkg:deb/debian/glibc@2.37-18?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-18%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2024-2961
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz
113
url VCID-skgp-p9xp-k3cf
vulnerability_id VCID-skgp-p9xp-k3cf
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3405
reference_id
reference_type
scores
0
value 0.00666
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-01T12:55:00Z
1
value 0.00666
scoring_system epss
scoring_elements 0.712
published_at 2026-04-02T12:55:00Z
2
value 0.00666
scoring_system epss
scoring_elements 0.71218
published_at 2026-04-04T12:55:00Z
3
value 0.00666
scoring_system epss
scoring_elements 0.71192
published_at 2026-04-07T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71234
published_at 2026-04-08T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-09T12:55:00Z
6
value 0.00666
scoring_system epss
scoring_elements 0.71271
published_at 2026-04-11T12:55:00Z
7
value 0.00666
scoring_system epss
scoring_elements 0.71256
published_at 2026-04-12T12:55:00Z
8
value 0.00666
scoring_system epss
scoring_elements 0.7124
published_at 2026-04-13T12:55:00Z
9
value 0.00666
scoring_system epss
scoring_elements 0.71287
published_at 2026-04-16T12:55:00Z
10
value 0.00666
scoring_system epss
scoring_elements 0.71293
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3405
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
reference_id 681473
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=833704
reference_id 833704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=833704
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2012:1098
reference_id RHSA-2012:1098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1098
7
reference_url https://access.redhat.com/errata/RHSA-2012:1200
reference_id RHSA-2012:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1200
8
reference_url https://usn.ubuntu.com/1589-1/
reference_id USN-1589-1
reference_type
scores
url https://usn.ubuntu.com/1589-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.13-35?distro=trixie
purl pkg:deb/debian/glibc@2.13-35?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-35%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2012-3405
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skgp-p9xp-k3cf
114
url VCID-sphp-4b55-9fer
vulnerability_id VCID-sphp-4b55-9fer
summary glibc: Vector register overwrite bug in glibc
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5745.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5745
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48792
published_at 2026-04-02T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48869
published_at 2026-04-18T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.4884
published_at 2026-04-11T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48815
published_at 2026-04-12T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48872
published_at 2026-04-16T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48817
published_at 2026-04-04T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48771
published_at 2026-04-07T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48826
published_at 2026-04-08T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48823
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5745
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107366
reference_id 1107366
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107366
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370488
reference_id 2370488
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370488
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33060
reference_id show_bug.cgi?id=33060
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T20:11:39Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33060
6
reference_url https://usn.ubuntu.com/7634-1/
reference_id USN-7634-1
reference_type
scores
url https://usn.ubuntu.com/7634-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-9?distro=trixie
purl pkg:deb/debian/glibc@2.41-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-9%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2025-5745
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sphp-4b55-9fer
115
url VCID-ssnc-wdcf-sfc9
vulnerability_id VCID-ssnc-wdcf-sfc9
summary glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15281.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-15281
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21392
published_at 2026-04-02T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21256
published_at 2026-04-18T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21307
published_at 2026-04-12T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21253
published_at 2026-04-13T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21246
published_at 2026-04-16T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21446
published_at 2026-04-04T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21197
published_at 2026-04-07T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21277
published_at 2026-04-08T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21339
published_at 2026-04-09T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21349
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-15281
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126266
reference_id 1126266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126266
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2431196
reference_id 2431196
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2431196
6
reference_url https://access.redhat.com/errata/RHSA-2026:2786
reference_id RHSA-2026:2786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2786
7
reference_url https://access.redhat.com/errata/RHSA-2026:3228
reference_id RHSA-2026:3228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3228
8
reference_url https://access.redhat.com/errata/RHSA-2026:4501
reference_id RHSA-2026:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4501
9
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4655
10
reference_url https://access.redhat.com/errata/RHSA-2026:4772
reference_id RHSA-2026:4772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4772
11
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
12
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5606
13
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33814
reference_id show_bug.cgi?id=33814
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-22T19:21:34Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33814
14
reference_url https://usn.ubuntu.com/8005-1/
reference_id USN-8005-1
reference_type
scores
url https://usn.ubuntu.com/8005-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.42-11?distro=trixie
purl pkg:deb/debian/glibc@2.42-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2025-15281
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssnc-wdcf-sfc9
116
url VCID-tcpv-4crc-zuap
vulnerability_id VCID-tcpv-4crc-zuap
summary glibc: glibc: Information disclosure via zero-valued network query
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0915.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0915
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05581
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05605
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05645
published_at 2026-04-12T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05592
published_at 2026-04-16T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05618
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05616
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05655
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05681
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05653
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125748
reference_id 1125748
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125748
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2430201
reference_id 2430201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2430201
6
reference_url https://access.redhat.com/errata/RHSA-2026:1334
reference_id RHSA-2026:1334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1334
7
reference_url https://access.redhat.com/errata/RHSA-2026:2786
reference_id RHSA-2026:2786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2786
8
reference_url https://access.redhat.com/errata/RHSA-2026:3228
reference_id RHSA-2026:3228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3228
9
reference_url https://access.redhat.com/errata/RHSA-2026:4501
reference_id RHSA-2026:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4501
10
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4655
11
reference_url https://access.redhat.com/errata/RHSA-2026:4772
reference_id RHSA-2026:4772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4772
12
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
13
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5606
14
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33802
reference_id show_bug.cgi?id=33802
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-20T16:03:19Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33802
15
reference_url https://usn.ubuntu.com/8005-1/
reference_id USN-8005-1
reference_type
scores
url https://usn.ubuntu.com/8005-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.42-8?distro=trixie
purl pkg:deb/debian/glibc@2.42-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-8%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2026-0915
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcpv-4crc-zuap
117
url VCID-tdxd-r347-3yex
vulnerability_id VCID-tdxd-r347-3yex
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0769.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0769.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1605.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1605.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1914
reference_id
reference_type
scores
0
value 0.03104
scoring_system epss
scoring_elements 0.86831
published_at 2026-04-18T12:55:00Z
1
value 0.03104
scoring_system epss
scoring_elements 0.86827
published_at 2026-04-16T12:55:00Z
2
value 0.03398
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-07T12:55:00Z
3
value 0.03398
scoring_system epss
scoring_elements 0.87403
published_at 2026-04-08T12:55:00Z
4
value 0.03398
scoring_system epss
scoring_elements 0.87359
published_at 2026-04-01T12:55:00Z
5
value 0.03398
scoring_system epss
scoring_elements 0.87422
published_at 2026-04-11T12:55:00Z
6
value 0.03398
scoring_system epss
scoring_elements 0.87417
published_at 2026-04-12T12:55:00Z
7
value 0.03398
scoring_system epss
scoring_elements 0.87413
published_at 2026-04-13T12:55:00Z
8
value 0.03398
scoring_system epss
scoring_elements 0.8741
published_at 2026-04-09T12:55:00Z
9
value 0.03398
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1914
5
reference_url https://bugzilla.novell.com/show_bug.cgi?id=813121
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=813121
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
7
reference_url http://seclists.org/fulldisclosure/2021/Sep/0
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2021/Sep/0
8
reference_url http://secunia.com/advisories/52817
reference_id
reference_type
scores
url http://secunia.com/advisories/52817
9
reference_url http://secunia.com/advisories/55113
reference_id
reference_type
scores
url http://secunia.com/advisories/55113
10
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=15330
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=15330
11
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
15
reference_url http://www.openwall.com/lists/oss-security/2013/04/03/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/03/2
16
reference_url http://www.openwall.com/lists/oss-security/2013/04/03/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/03/8
17
reference_url http://www.openwall.com/lists/oss-security/2013/04/05/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/05/1
18
reference_url http://www.securityfocus.com/bid/58839
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58839
19
reference_url http://www.ubuntu.com/usn/USN-1991-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1991-1
20
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623
reference_id 704623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=947882
reference_id 947882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=947882
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1914
reference_id CVE-2013-1914
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1914
60
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
61
reference_url https://access.redhat.com/errata/RHSA-2013:0769
reference_id RHSA-2013:0769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0769
62
reference_url https://access.redhat.com/errata/RHSA-2013:1605
reference_id RHSA-2013:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1605
63
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.17-2?distro=trixie
purl pkg:deb/debian/glibc@2.17-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-1914
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex
118
url VCID-tgp7-xmws-kued
vulnerability_id VCID-tgp7-xmws-kued
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6779.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6779
reference_id
reference_type
scores
0
value 0.00654
scoring_system epss
scoring_elements 0.70965
published_at 2026-04-18T12:55:00Z
1
value 0.00654
scoring_system epss
scoring_elements 0.70943
published_at 2026-04-11T12:55:00Z
2
value 0.00654
scoring_system epss
scoring_elements 0.70927
published_at 2026-04-12T12:55:00Z
3
value 0.00654
scoring_system epss
scoring_elements 0.70911
published_at 2026-04-13T12:55:00Z
4
value 0.00654
scoring_system epss
scoring_elements 0.70958
published_at 2026-04-16T12:55:00Z
5
value 0.0071
scoring_system epss
scoring_elements 0.72203
published_at 2026-04-04T12:55:00Z
6
value 0.0071
scoring_system epss
scoring_elements 0.72183
published_at 2026-04-02T12:55:00Z
7
value 0.0071
scoring_system epss
scoring_elements 0.72227
published_at 2026-04-09T12:55:00Z
8
value 0.0071
scoring_system epss
scoring_elements 0.72215
published_at 2026-04-08T12:55:00Z
9
value 0.0071
scoring_system epss
scoring_elements 0.72178
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6779
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254395
reference_id 2254395
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2254395
4
reference_url http://seclists.org/fulldisclosure/2024/Feb/3
reference_id 3
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url http://seclists.org/fulldisclosure/2024/Feb/3
5
reference_url https://www.openwall.com/lists/oss-security/2024/01/30/6
reference_id 6
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://www.openwall.com/lists/oss-security/2024/01/30/6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2023-6779
reference_id CVE-2023-6779
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://access.redhat.com/security/cve/CVE-2023-6779
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
reference_id D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
12
reference_url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_id glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
13
reference_url https://security.gentoo.org/glsa/202402-01
reference_id GLSA-202402-01
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://security.gentoo.org/glsa/202402-01
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
reference_id MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
15
reference_url https://security.netapp.com/advisory/ntap-20240223-0006/
reference_id ntap-20240223-0006
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://security.netapp.com/advisory/ntap-20240223-0006/
16
reference_url https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
reference_id syslog.txt
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/
url https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
17
reference_url https://usn.ubuntu.com/6620-1/
reference_id USN-6620-1
reference_type
scores
url https://usn.ubuntu.com/6620-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-15?distro=trixie
purl pkg:deb/debian/glibc@2.37-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-15%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-6779
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgp7-xmws-kued
119
url VCID-tp9v-vmge-nkdf
vulnerability_id VCID-tp9v-vmge-nkdf
summary glibc: _IO_wstr_overflow integer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8983
reference_id
reference_type
scores
0
value 0.00525
scoring_system epss
scoring_elements 0.67039
published_at 2026-04-18T12:55:00Z
1
value 0.00525
scoring_system epss
scoring_elements 0.66992
published_at 2026-04-13T12:55:00Z
2
value 0.00525
scoring_system epss
scoring_elements 0.67025
published_at 2026-04-16T12:55:00Z
3
value 0.00525
scoring_system epss
scoring_elements 0.66918
published_at 2026-04-01T12:55:00Z
4
value 0.00525
scoring_system epss
scoring_elements 0.66956
published_at 2026-04-02T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.66981
published_at 2026-04-04T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.66955
published_at 2026-04-07T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67005
published_at 2026-04-08T12:55:00Z
8
value 0.00525
scoring_system epss
scoring_elements 0.67017
published_at 2026-04-09T12:55:00Z
9
value 0.00525
scoring_system epss
scoring_elements 0.67037
published_at 2026-04-11T12:55:00Z
10
value 0.00525
scoring_system epss
scoring_elements 0.67022
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8983
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17269
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17269
5
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
6
reference_url https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
reference_id
reference_type
scores
url https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
7
reference_url http://www.openwall.com/lists/oss-security/2017/02/14/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/02/14/9
8
reference_url http://www.securityfocus.com/bid/72740
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/72740
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195762
reference_id 1195762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195762
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587
reference_id 779587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8983
reference_id CVE-2015-8983
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8983
13
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8983
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tp9v-vmge-nkdf
120
url VCID-twn9-zhjq-uqe6
vulnerability_id VCID-twn9-zhjq-uqe6
summary glibc: Not closing unhadleable client sockets due to nscd daemon leads to DoS.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7254.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-7254
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12872
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12728
published_at 2026-04-18T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12821
published_at 2026-04-13T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12725
published_at 2026-04-16T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12966
published_at 2026-04-02T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13014
published_at 2026-04-04T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12815
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12893
published_at 2026-04-08T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-09T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12902
published_at 2026-04-11T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12867
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-7254
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7254
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=2498
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=2498
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1698738
reference_id 1698738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1698738
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-7254
reference_id CVE-2006-7254
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2006-7254
fixed_packages
0
url pkg:deb/debian/glibc@2.5-1?distro=trixie
purl pkg:deb/debian/glibc@2.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.5-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2006-7254
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twn9-zhjq-uqe6
121
url VCID-uqdb-tx7y-bbbc
vulnerability_id VCID-uqdb-tx7y-bbbc
summary glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11237
reference_id
reference_type
scores
0
value 0.00797
scoring_system epss
scoring_elements 0.73959
published_at 2026-04-01T12:55:00Z
1
value 0.00797
scoring_system epss
scoring_elements 0.74055
published_at 2026-04-18T12:55:00Z
2
value 0.00797
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-12T12:55:00Z
3
value 0.00797
scoring_system epss
scoring_elements 0.74007
published_at 2026-04-13T12:55:00Z
4
value 0.00797
scoring_system epss
scoring_elements 0.74046
published_at 2026-04-16T12:55:00Z
5
value 0.00797
scoring_system epss
scoring_elements 0.73966
published_at 2026-04-02T12:55:00Z
6
value 0.00797
scoring_system epss
scoring_elements 0.73991
published_at 2026-04-04T12:55:00Z
7
value 0.00797
scoring_system epss
scoring_elements 0.73963
published_at 2026-04-07T12:55:00Z
8
value 0.00797
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-08T12:55:00Z
9
value 0.00797
scoring_system epss
scoring_elements 0.7401
published_at 2026-04-09T12:55:00Z
10
value 0.00797
scoring_system epss
scoring_elements 0.74032
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11237
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.netapp.com/advisory/ntap-20190329-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190329-0001/
6
reference_url https://security.netapp.com/advisory/ntap-20190401-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190401-0001/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=23196
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=23196
8
reference_url https://www.exploit-db.com/exploits/44750/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44750/
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.securityfocus.com/bid/104256
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104256
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581274
reference_id 1581274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581274
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070
reference_id 899070
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11237
reference_id CVE-2018-11237
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11237
29
reference_url https://access.redhat.com/errata/RHSA-2018:3092
reference_id RHSA-2018:3092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3092
30
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.27-4?distro=trixie
purl pkg:deb/debian/glibc@2.27-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2018-11237
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqdb-tx7y-bbbc
122
url VCID-utss-75dn-r3b7
vulnerability_id VCID-utss-75dn-r3b7
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8985
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41953
published_at 2026-04-18T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41931
published_at 2026-04-13T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41981
published_at 2026-04-16T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.4188
published_at 2026-04-01T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41945
published_at 2026-04-12T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41972
published_at 2026-04-04T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41899
published_at 2026-04-07T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41949
published_at 2026-04-08T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.4196
published_at 2026-04-09T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41983
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8985
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2017/02/14/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/02/14/9
6
reference_url http://www.securityfocus.com/bid/76916
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76916
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1197798
reference_id 1197798
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1197798
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8985
reference_id CVE-2015-8985
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8985
10
reference_url https://security.gentoo.org/glsa/201908-06
reference_id GLSA-201908-06
reference_type
scores
url https://security.gentoo.org/glsa/201908-06
fixed_packages
0
url pkg:deb/debian/glibc@2.28-1?distro=trixie
purl pkg:deb/debian/glibc@2.28-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8985
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-utss-75dn-r3b7
123
url VCID-v7ut-qjzy-2yfs
vulnerability_id VCID-v7ut-qjzy-2yfs
summary glibc: buffer overflow in getgrouplist function leading to corrupted memory
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3590.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3590
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62132
published_at 2026-04-01T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62295
published_at 2026-04-18T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62243
published_at 2026-04-13T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62288
published_at 2026-04-16T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62192
published_at 2026-04-02T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62223
published_at 2026-04-04T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.6219
published_at 2026-04-07T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62239
published_at 2026-04-08T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62256
published_at 2026-04-09T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62275
published_at 2026-04-11T12:55:00Z
10
value 0.00426
scoring_system epss
scoring_elements 0.62265
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3590
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=661
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=661
4
reference_url https://support.f5.com/csp/article/K12740406
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K12740406
5
reference_url http://www.securityfocus.com/bid/107871
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107871
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1706046
reference_id 1706046
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1706046
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3590
reference_id CVE-2005-3590
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2005-3590
fixed_packages
0
url pkg:deb/debian/glibc@2.3.5-3?distro=trixie
purl pkg:deb/debian/glibc@2.3.5-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.5-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2005-3590
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ut-qjzy-2yfs
124
url VCID-v96m-se3g-8ydp
vulnerability_id VCID-v96m-se3g-8ydp
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10228
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.61384
published_at 2026-04-01T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61554
published_at 2026-04-18T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61509
published_at 2026-04-13T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.6155
published_at 2026-04-16T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61461
published_at 2026-04-02T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61489
published_at 2026-04-04T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-07T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.61507
published_at 2026-04-08T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.61522
published_at 2026-04-09T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61543
published_at 2026-04-11T12:55:00Z
10
value 0.00413
scoring_system epss
scoring_elements 0.61529
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1428290
reference_id 1428290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1428290
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503
reference_id 856503
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503
6
reference_url https://security.gentoo.org/glsa/202101-20
reference_id GLSA-202101-20
reference_type
scores
url https://security.gentoo.org/glsa/202101-20
7
reference_url https://access.redhat.com/errata/RHSA-2021:1585
reference_id RHSA-2021:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1585
8
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
9
reference_url https://usn.ubuntu.com/5768-1/
reference_id USN-5768-1
reference_type
scores
url https://usn.ubuntu.com/5768-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-3?distro=trixie
purl pkg:deb/debian/glibc@2.31-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-10228
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v96m-se3g-8ydp
125
url VCID-vajf-thpr-pbat
vulnerability_id VCID-vajf-thpr-pbat
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19591
reference_id
reference_type
scores
0
value 0.01364
scoring_system epss
scoring_elements 0.80134
published_at 2026-04-01T12:55:00Z
1
value 0.01364
scoring_system epss
scoring_elements 0.80205
published_at 2026-04-11T12:55:00Z
2
value 0.01364
scoring_system epss
scoring_elements 0.80141
published_at 2026-04-02T12:55:00Z
3
value 0.01364
scoring_system epss
scoring_elements 0.80186
published_at 2026-04-09T12:55:00Z
4
value 0.01364
scoring_system epss
scoring_elements 0.80178
published_at 2026-04-08T12:55:00Z
5
value 0.01364
scoring_system epss
scoring_elements 0.80161
published_at 2026-04-04T12:55:00Z
6
value 0.01364
scoring_system epss
scoring_elements 0.8015
published_at 2026-04-07T12:55:00Z
7
value 0.01775
scoring_system epss
scoring_elements 0.82711
published_at 2026-04-18T12:55:00Z
8
value 0.01775
scoring_system epss
scoring_elements 0.82677
published_at 2026-04-12T12:55:00Z
9
value 0.01775
scoring_system epss
scoring_elements 0.82673
published_at 2026-04-13T12:55:00Z
10
value 0.01775
scoring_system epss
scoring_elements 0.8271
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19591
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591
3
reference_url http://www.securitytracker.com/id/1042174
reference_id 1042174
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url http://www.securitytracker.com/id/1042174
4
reference_url http://www.securityfocus.com/bid/106037
reference_id 106037
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url http://www.securityfocus.com/bid/106037
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1653993
reference_id 1653993
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1653993
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837
reference_id 914837
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837
7
reference_url https://security.archlinux.org/AVG-830
reference_id AVG-830
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-830
8
reference_url https://security.archlinux.org/AVG-831
reference_id AVG-831
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-831
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/
reference_id BO7WHN52GFMC5F2I2232GFIPSSXWFV7G
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/
10
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408
reference_id gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408
11
reference_url https://security.gentoo.org/glsa/201903-09
reference_id GLSA-201903-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://security.gentoo.org/glsa/201903-09
12
reference_url https://security.gentoo.org/glsa/201908-06
reference_id GLSA-201908-06
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://security.gentoo.org/glsa/201908-06
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/
reference_id M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/
14
reference_url https://security.netapp.com/advisory/ntap-20190321-0003/
reference_id ntap-20190321-0003
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://security.netapp.com/advisory/ntap-20190321-0003/
15
reference_url https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD
reference_id ?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD
16
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=23927
reference_id show_bug.cgi?id=23927
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=23927
17
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.28-1?distro=trixie
purl pkg:deb/debian/glibc@2.28-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2018-19591
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vajf-thpr-pbat
126
url VCID-vake-u1n1-x3hx
vulnerability_id VCID-vake-u1n1-x3hx
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5180
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.6116
published_at 2026-04-01T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61299
published_at 2026-04-09T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61318
published_at 2026-04-11T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61304
published_at 2026-04-12T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61285
published_at 2026-04-13T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.6124
published_at 2026-04-02T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61269
published_at 2026-04-04T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61236
published_at 2026-04-07T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61284
published_at 2026-04-08T12:55:00Z
9
value 0.00737
scoring_system epss
scoring_elements 0.72876
published_at 2026-04-16T12:55:00Z
10
value 0.00737
scoring_system epss
scoring_elements 0.72885
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1249603
reference_id 1249603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1249603
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106
reference_id 796106
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106
6
reference_url https://security.gentoo.org/glsa/201706-19
reference_id GLSA-201706-19
reference_type
scores
url https://security.gentoo.org/glsa/201706-19
7
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
8
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.24-9?distro=trixie
purl pkg:deb/debian/glibc@2.24-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-9%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-5180
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vake-u1n1-x3hx
127
url VCID-vcf1-m7tr-zbgc
vulnerability_id VCID-vcf1-m7tr-zbgc
summary
Multiple vulnerabilities were found in glibc, the worst of which allowing
    local attackers to execute arbitrary code as root.
references
0
reference_url http://frugalware.org/security/662
reference_id
reference_type
scores
url http://frugalware.org/security/662
1
reference_url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0296.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0296.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0296
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30382
published_at 2026-04-18T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30497
published_at 2026-04-01T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30523
published_at 2026-04-02T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30569
published_at 2026-04-04T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30379
published_at 2026-04-07T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30439
published_at 2026-04-08T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30474
published_at 2026-04-09T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30476
published_at 2026-04-11T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30432
published_at 2026-04-12T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30383
published_at 2026-04-13T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30401
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0296
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296
5
reference_url http://seclists.org/fulldisclosure/2019/Jun/18
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jun/18
6
reference_url http://secunia.com/advisories/39900
reference_id
reference_type
scores
url http://secunia.com/advisories/39900
7
reference_url http://secunia.com/advisories/43830
reference_id
reference_type
scores
url http://secunia.com/advisories/43830
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://security.gentoo.org/glsa/glsa-201011-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201011-01.xml
10
reference_url http://securitytracker.com/id?1024043
reference_id
reference_type
scores
url http://securitytracker.com/id?1024043
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/59240
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/59240
12
reference_url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
reference_id
reference_type
scores
url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
13
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540
14
reference_url https://seclists.org/bugtraq/2019/Jun/14
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jun/14
15
reference_url http://www.debian.org/security/2010/dsa-2058
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2058
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:112
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0412.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0412.html
19
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
20
reference_url http://www.ubuntu.com/usn/USN-944-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-944-1
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2010/1246
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1246
23
reference_url http://www.vupen.com/english/advisories/2011/0863
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0863
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=559579
reference_id 559579
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=559579
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583908
reference_id 583908
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583908
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0296
reference_id CVE-2010-0296
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-0296
66
reference_url https://security.gentoo.org/glsa/201011-01
reference_id GLSA-201011-01
reference_type
scores
url https://security.gentoo.org/glsa/201011-01
67
reference_url https://access.redhat.com/errata/RHSA-2011:0412
reference_id RHSA-2011:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0412
68
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
69
reference_url https://usn.ubuntu.com/944-1/
reference_id USN-944-1
reference_type
scores
url https://usn.ubuntu.com/944-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.11-1?distro=trixie
purl pkg:deb/debian/glibc@2.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2010-0296
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcf1-m7tr-zbgc
128
url VCID-ven5-emb5-a7bh
vulnerability_id VCID-ven5-emb5-a7bh
summary
Multiple vulnerabilities have been found in the GNU C Library, the
    worst of which allows context-dependent attackers to execute arbitrary
    code.
references
0
reference_url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2172.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2172.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5277
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27957
published_at 2026-04-18T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28039
published_at 2026-04-01T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.2811
published_at 2026-04-02T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28154
published_at 2026-04-04T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.2795
published_at 2026-04-07T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28017
published_at 2026-04-08T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28059
published_at 2026-04-09T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28065
published_at 2026-04-11T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28022
published_at 2026-04-12T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.27965
published_at 2026-04-13T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.27974
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277
5
reference_url http://seclists.org/fulldisclosure/2019/Sep/7
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Sep/7
6
reference_url https://seclists.org/bugtraq/2019/Sep/7
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/7
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17079
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17079
8
reference_url https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
reference_id
reference_type
scores
url https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
9
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
10
reference_url http://www.securityfocus.com/bid/78092
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/78092
11
reference_url http://www.securitytracker.com/id/1034196
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034196
12
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
13
reference_url http://www.ubuntu.com/usn/USN-2985-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-2
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262914
reference_id 1262914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262914
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966
reference_id 799966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5277
reference_id CVE-2015-5277
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-5277
25
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
26
reference_url https://access.redhat.com/errata/RHSA-2015:2172
reference_id RHSA-2015:2172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2172
27
reference_url https://access.redhat.com/errata/RHSA-2015:2589
reference_id RHSA-2015:2589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2589
28
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-5277
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ven5-emb5-a7bh
129
url VCID-vqyv-kf5w-vkch
vulnerability_id VCID-vqyv-kf5w-vkch
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1752
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40442
published_at 2026-04-01T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40521
published_at 2026-04-02T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40548
published_at 2026-04-04T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40469
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.4052
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40532
published_at 2026-04-09T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40552
published_at 2026-04-11T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40515
published_at 2026-04-12T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40495
published_at 2026-04-13T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40543
published_at 2026-04-16T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40511
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1752
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1810718
reference_id 1810718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1810718
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788
reference_id 953788
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788
6
reference_url https://security.gentoo.org/glsa/202101-20
reference_id GLSA-202101-20
reference_type
scores
url https://security.gentoo.org/glsa/202101-20
7
reference_url https://access.redhat.com/errata/RHSA-2020:4444
reference_id RHSA-2020:4444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4444
8
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.30-3?distro=trixie
purl pkg:deb/debian/glibc@2.30-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.30-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2020-1752
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyv-kf5w-vkch
130
url VCID-vttu-hcan-6fba
vulnerability_id VCID-vttu-hcan-6fba
summary security update
references
0
reference_url http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
reference_id
reference_type
scores
url http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
1
reference_url http://linux.oracle.com/errata/ELSA-2015-0092.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2015-0092.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1118.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1118.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5119.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5119.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5119
reference_id
reference_type
scores
0
value 0.21511
scoring_system epss
scoring_elements 0.95727
published_at 2026-04-18T12:55:00Z
1
value 0.21511
scoring_system epss
scoring_elements 0.95723
published_at 2026-04-16T12:55:00Z
2
value 0.22024
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-04T12:55:00Z
3
value 0.22024
scoring_system epss
scoring_elements 0.95762
published_at 2026-04-07T12:55:00Z
4
value 0.22024
scoring_system epss
scoring_elements 0.9577
published_at 2026-04-08T12:55:00Z
5
value 0.22024
scoring_system epss
scoring_elements 0.95743
published_at 2026-04-01T12:55:00Z
6
value 0.22024
scoring_system epss
scoring_elements 0.95778
published_at 2026-04-11T12:55:00Z
7
value 0.22024
scoring_system epss
scoring_elements 0.95777
published_at 2026-04-12T12:55:00Z
8
value 0.22024
scoring_system epss
scoring_elements 0.95779
published_at 2026-04-13T12:55:00Z
9
value 0.22024
scoring_system epss
scoring_elements 0.95774
published_at 2026-04-09T12:55:00Z
10
value 0.22024
scoring_system epss
scoring_elements 0.95752
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5119
6
reference_url https://code.google.com/p/google-security-research/issues/detail?id=96
reference_id
reference_type
scores
url https://code.google.com/p/google-security-research/issues/detail?id=96
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
8
reference_url http://seclists.org/fulldisclosure/2014/Aug/69
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Aug/69
9
reference_url http://secunia.com/advisories/60345
reference_id
reference_type
scores
url http://secunia.com/advisories/60345
10
reference_url http://secunia.com/advisories/60358
reference_id
reference_type
scores
url http://secunia.com/advisories/60358
11
reference_url http://secunia.com/advisories/60441
reference_id
reference_type
scores
url http://secunia.com/advisories/60441
12
reference_url http://secunia.com/advisories/61074
reference_id
reference_type
scores
url http://secunia.com/advisories/61074
13
reference_url http://secunia.com/advisories/61093
reference_id
reference_type
scores
url http://secunia.com/advisories/61093
14
reference_url https://rhn.redhat.com/errata/RHSA-2014-1110.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2014-1110.html
15
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17187
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17187
16
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21685604
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21685604
18
reference_url http://www.debian.org/security/2014/dsa-3012
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3012
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
20
reference_url http://www.openwall.com/lists/oss-security/2014/07/14/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/14/1
21
reference_url http://www.openwall.com/lists/oss-security/2014/08/13/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/08/13/5
22
reference_url http://www.securityfocus.com/bid/68983
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68983
23
reference_url http://www.securityfocus.com/bid/69738
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69738
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1119128
reference_id 1119128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1119128
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5119
reference_id CVE-2014-5119
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5119
28
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34421.c
reference_id CVE-2014-5119;OSVDB-109188
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34421.c
29
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
30
reference_url https://access.redhat.com/errata/RHSA-2014:1110
reference_id RHSA-2014:1110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1110
31
reference_url https://access.redhat.com/errata/RHSA-2014:1118
reference_id RHSA-2014:1118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1118
32
reference_url https://usn.ubuntu.com/2328-1/
reference_id USN-2328-1
reference_type
scores
url https://usn.ubuntu.com/2328-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-10?distro=trixie
purl pkg:deb/debian/glibc@2.19-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-5119
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vttu-hcan-6fba
131
url VCID-vvkk-5k95-fqfk
vulnerability_id VCID-vvkk-5k95-fqfk
summary security flaw
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0968.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0968.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0968
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.2198
published_at 2026-04-18T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21945
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22106
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22155
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21937
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22018
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22072
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22087
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-12T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21986
published_at 2026-04-13T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21984
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0968
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0968
4
reference_url http://security.gentoo.org/glsa/glsa-200410-19.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200410-19.xml
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523
7
reference_url https://www.ubuntu.com/usn/usn-4-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-4-1/
8
reference_url http://www.debian.org/security/2005/dsa-636
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-636
9
reference_url http://www.redhat.com/support/errata/RHSA-2004-586.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2004-586.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2005-261.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-261.html
11
reference_url http://www.securityfocus.com/bid/11286
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11286
12
reference_url http://www.trustix.org/errata/2004/0050
reference_id
reference_type
scores
url http://www.trustix.org/errata/2004/0050
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617335
reference_id 1617335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617335
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0968
reference_id CVE-2004-0968
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2004-0968
45
reference_url https://access.redhat.com/errata/RHSA-2004:586
reference_id RHSA-2004:586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:586
46
reference_url https://access.redhat.com/errata/RHSA-2005:261
reference_id RHSA-2005:261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:261
47
reference_url https://usn.ubuntu.com/4-1/
reference_id USN-4-1
reference_type
scores
url https://usn.ubuntu.com/4-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.3.2.ds1-19?distro=trixie
purl pkg:deb/debian/glibc@2.3.2.ds1-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-19%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2004-0968
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvkk-5k95-fqfk
132
url VCID-w16u-mjyw-pben
vulnerability_id VCID-w16u-mjyw-pben
summary Multiple vulnerabilities in glibc could result in Local Privilege Escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4527.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4527
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28561
published_at 2026-04-18T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28694
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28613
published_at 2026-04-12T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28565
published_at 2026-04-13T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28585
published_at 2026-04-16T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28743
published_at 2026-04-04T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.2855
published_at 2026-04-07T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28615
published_at 2026-04-08T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28655
published_at 2026-04-09T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28657
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4527
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051958
reference_id 1051958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051958
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234712
reference_id 2234712
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2234712
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
13
reference_url https://access.redhat.com/security/cve/CVE-2023-4527
reference_id CVE-2023-4527
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/
url https://access.redhat.com/security/cve/CVE-2023-4527
14
reference_url https://security.gentoo.org/glsa/202310-03
reference_id GLSA-202310-03
reference_type
scores
url https://security.gentoo.org/glsa/202310-03
15
reference_url https://access.redhat.com/errata/RHSA-2023:5453
reference_id RHSA-2023:5453
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/
url https://access.redhat.com/errata/RHSA-2023:5453
16
reference_url https://access.redhat.com/errata/RHSA-2023:5455
reference_id RHSA-2023:5455
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/
url https://access.redhat.com/errata/RHSA-2023:5455
17
reference_url https://usn.ubuntu.com/6409-1/
reference_id USN-6409-1
reference_type
scores
url https://usn.ubuntu.com/6409-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-9?distro=trixie
purl pkg:deb/debian/glibc@2.37-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-9%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2023-4527
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w16u-mjyw-pben
133
url VCID-w1zk-1c5m-3fb2
vulnerability_id VCID-w1zk-1c5m-3fb2
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4458
reference_id
reference_type
scores
0
value 0.01201
scoring_system epss
scoring_elements 0.78873
published_at 2026-04-01T12:55:00Z
1
value 0.01201
scoring_system epss
scoring_elements 0.78879
published_at 2026-04-02T12:55:00Z
2
value 0.01201
scoring_system epss
scoring_elements 0.78908
published_at 2026-04-04T12:55:00Z
3
value 0.01201
scoring_system epss
scoring_elements 0.78889
published_at 2026-04-07T12:55:00Z
4
value 0.01201
scoring_system epss
scoring_elements 0.78914
published_at 2026-04-08T12:55:00Z
5
value 0.01201
scoring_system epss
scoring_elements 0.7892
published_at 2026-04-13T12:55:00Z
6
value 0.01201
scoring_system epss
scoring_elements 0.78944
published_at 2026-04-11T12:55:00Z
7
value 0.01201
scoring_system epss
scoring_elements 0.78929
published_at 2026-04-12T12:55:00Z
8
value 0.01201
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-16T12:55:00Z
9
value 0.01201
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1022280
reference_id 1022280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1022280
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181
reference_id 727181
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2014:1391
reference_id RHSA-2014:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1391
7
reference_url https://usn.ubuntu.com/2306-1/
reference_id USN-2306-1
reference_type
scores
url https://usn.ubuntu.com/2306-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.18-1?distro=trixie
purl pkg:deb/debian/glibc@2.18-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.18-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-4458
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1zk-1c5m-3fb2
134
url VCID-w5hj-83tc-fufp
vulnerability_id VCID-w5hj-83tc-fufp
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2015-0092.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2015-0092.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0475.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0475.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0475
reference_id
reference_type
scores
0
value 0.00604
scoring_system epss
scoring_elements 0.69625
published_at 2026-04-18T12:55:00Z
1
value 0.00604
scoring_system epss
scoring_elements 0.69511
published_at 2026-04-01T12:55:00Z
2
value 0.00604
scoring_system epss
scoring_elements 0.69522
published_at 2026-04-02T12:55:00Z
3
value 0.00604
scoring_system epss
scoring_elements 0.69537
published_at 2026-04-04T12:55:00Z
4
value 0.00604
scoring_system epss
scoring_elements 0.69516
published_at 2026-04-07T12:55:00Z
5
value 0.00604
scoring_system epss
scoring_elements 0.69567
published_at 2026-04-08T12:55:00Z
6
value 0.00604
scoring_system epss
scoring_elements 0.69583
published_at 2026-04-09T12:55:00Z
7
value 0.00604
scoring_system epss
scoring_elements 0.69605
published_at 2026-04-11T12:55:00Z
8
value 0.00604
scoring_system epss
scoring_elements 0.69589
published_at 2026-04-12T12:55:00Z
9
value 0.00604
scoring_system epss
scoring_elements 0.69576
published_at 2026-04-13T12:55:00Z
10
value 0.00604
scoring_system epss
scoring_elements 0.69616
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0475
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
4
reference_url https://rhn.redhat.com/errata/RHSA-2014-1110.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2014-1110.html
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17137
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17137
6
reference_url http://www.debian.org/security/2014/dsa-2976
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2976
7
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
8
reference_url http://www.openwall.com/lists/oss-security/2014/07/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/10/7
9
reference_url http://www.openwall.com/lists/oss-security/2014/07/14/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/14/6
10
reference_url http://www.securityfocus.com/bid/68505
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68505
11
reference_url http://www.securitytracker.com/id/1030569
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030569
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102353
reference_id 1102353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102353
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0475
reference_id CVE-2014-0475
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-0475
43
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
44
reference_url https://access.redhat.com/errata/RHSA-2014:1110
reference_id RHSA-2014:1110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1110
45
reference_url https://usn.ubuntu.com/2306-1/
reference_id USN-2306-1
reference_type
scores
url https://usn.ubuntu.com/2306-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-6?distro=trixie
purl pkg:deb/debian/glibc@2.19-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-6%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-0475
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5hj-83tc-fufp
135
url VCID-w8rc-tnpk-83c4
vulnerability_id VCID-w8rc-tnpk-83c4
summary
Multiple vulnerabilities were found in glibc, the worst of which allowing
    local attackers to execute arbitrary code as root.
references
0
reference_url http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html
reference_id
reference_type
scores
url http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html
1
reference_url http://frugalware.org/security/662
reference_id
reference_type
scores
url http://frugalware.org/security/662
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0830.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0830
reference_id
reference_type
scores
0
value 0.06292
scoring_system epss
scoring_elements 0.9097
published_at 2026-04-18T12:55:00Z
1
value 0.06292
scoring_system epss
scoring_elements 0.90897
published_at 2026-04-01T12:55:00Z
2
value 0.06292
scoring_system epss
scoring_elements 0.90902
published_at 2026-04-02T12:55:00Z
3
value 0.06292
scoring_system epss
scoring_elements 0.90912
published_at 2026-04-04T12:55:00Z
4
value 0.06292
scoring_system epss
scoring_elements 0.90922
published_at 2026-04-07T12:55:00Z
5
value 0.06292
scoring_system epss
scoring_elements 0.90933
published_at 2026-04-08T12:55:00Z
6
value 0.06292
scoring_system epss
scoring_elements 0.90939
published_at 2026-04-09T12:55:00Z
7
value 0.06292
scoring_system epss
scoring_elements 0.90948
published_at 2026-04-12T12:55:00Z
8
value 0.06292
scoring_system epss
scoring_elements 0.90947
published_at 2026-04-13T12:55:00Z
9
value 0.06292
scoring_system epss
scoring_elements 0.90972
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0830
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830
5
reference_url http://secunia.com/advisories/39900
reference_id
reference_type
scores
url http://secunia.com/advisories/39900
6
reference_url http://security.gentoo.org/glsa/glsa-201011-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201011-01.xml
7
reference_url http://securitytracker.com/id?1024044
reference_id
reference_type
scores
url http://securitytracker.com/id?1024044
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/58915
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/58915
9
reference_url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
reference_id
reference_type
scores
url https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
10
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5
11
reference_url http://www.debian.org/security/2010/dsa-2058
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2058
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:112
14
reference_url http://www.securityfocus.com/bid/40063
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40063
15
reference_url http://www.ubuntu.com/usn/USN-944-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-944-1
16
reference_url http://www.vupen.com/english/advisories/2010/1246
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1246
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=599056
reference_id 599056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=599056
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0830
reference_id CVE-2010-0830
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-0830
57
reference_url https://security.gentoo.org/glsa/201011-01
reference_id GLSA-201011-01
reference_type
scores
url https://security.gentoo.org/glsa/201011-01
58
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
59
reference_url https://access.redhat.com/errata/RHSA-2012:0126
reference_id RHSA-2012:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0126
60
reference_url https://usn.ubuntu.com/944-1/
reference_id USN-944-1
reference_type
scores
url https://usn.ubuntu.com/944-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.11-1?distro=trixie
purl pkg:deb/debian/glibc@2.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2010-0830
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8rc-tnpk-83c4
136
url VCID-wctr-ebf2-gqa1
vulnerability_id VCID-wctr-ebf2-gqa1
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15670
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44273
published_at 2026-04-01T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.4439
published_at 2026-04-18T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44354
published_at 2026-04-08T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44359
published_at 2026-04-09T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44376
published_at 2026-04-11T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44345
published_at 2026-04-12T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.444
published_at 2026-04-16T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44344
published_at 2026-04-13T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44366
published_at 2026-04-04T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44302
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22320
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22320
5
reference_url http://www.securityfocus.com/bid/101521
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101521
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1504804
reference_id 1504804
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1504804
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501
reference_id 879501
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501
8
reference_url https://security.archlinux.org/ASA-201801-8
reference_id ASA-201801-8
reference_type
scores
url https://security.archlinux.org/ASA-201801-8
9
reference_url https://security.archlinux.org/ASA-201801-9
reference_id ASA-201801-9
reference_type
scores
url https://security.archlinux.org/ASA-201801-9
10
reference_url https://security.archlinux.org/AVG-460
reference_id AVG-460
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-460
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15670
reference_id CVE-2017-15670
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15670
13
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
14
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
15
reference_url https://access.redhat.com/errata/RHSA-2018:1879
reference_id RHSA-2018:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1879
16
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.25-3?distro=trixie
purl pkg:deb/debian/glibc@2.25-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-15670
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wctr-ebf2-gqa1
137
url VCID-weg2-kxcj-fkcg
vulnerability_id VCID-weg2-kxcj-fkcg
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
6
reference_url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2017-0680.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0680.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8778
reference_id
reference_type
scores
0
value 0.06102
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-18T12:55:00Z
1
value 0.09807
scoring_system epss
scoring_elements 0.92936
published_at 2026-04-01T12:55:00Z
2
value 0.09807
scoring_system epss
scoring_elements 0.92964
published_at 2026-04-13T12:55:00Z
3
value 0.09807
scoring_system epss
scoring_elements 0.92974
published_at 2026-04-16T12:55:00Z
4
value 0.09807
scoring_system epss
scoring_elements 0.92945
published_at 2026-04-02T12:55:00Z
5
value 0.09807
scoring_system epss
scoring_elements 0.92949
published_at 2026-04-04T12:55:00Z
6
value 0.09807
scoring_system epss
scoring_elements 0.92948
published_at 2026-04-07T12:55:00Z
7
value 0.09807
scoring_system epss
scoring_elements 0.92956
published_at 2026-04-08T12:55:00Z
8
value 0.09807
scoring_system epss
scoring_elements 0.9296
published_at 2026-04-09T12:55:00Z
9
value 0.09807
scoring_system epss
scoring_elements 0.92965
published_at 2026-04-11T12:55:00Z
10
value 0.09807
scoring_system epss
scoring_elements 0.92963
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8778
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
17
reference_url http://seclists.org/fulldisclosure/2019/Sep/7
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Sep/7
18
reference_url https://seclists.org/bugtraq/2019/Sep/7
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/7
19
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18240
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=18240
20
reference_url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
reference_id
reference_type
scores
url https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
21
reference_url http://www.debian.org/security/2016/dsa-3480
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3480
22
reference_url http://www.debian.org/security/2016/dsa-3481
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3481
23
reference_url http://www.openwall.com/lists/oss-security/2016/01/19/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/19/11
24
reference_url http://www.openwall.com/lists/oss-security/2016/01/20/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/20/1
25
reference_url http://www.securityfocus.com/bid/83275
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83275
26
reference_url http://www.ubuntu.com/usn/USN-2985-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-1
27
reference_url http://www.ubuntu.com/usn/USN-2985-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2985-2
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1300303
reference_id 1300303
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1300303
29
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441
reference_id 812441
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8778
reference_id CVE-2015-8778
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8778
55
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
56
reference_url https://security.gentoo.org/glsa/201702-11
reference_id GLSA-201702-11
reference_type
scores
url https://security.gentoo.org/glsa/201702-11
57
reference_url https://access.redhat.com/errata/RHSA-2017:0680
reference_id RHSA-2017:0680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0680
58
reference_url https://access.redhat.com/errata/RHSA-2017:1916
reference_id RHSA-2017:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1916
59
reference_url https://usn.ubuntu.com/2985-1/
reference_id USN-2985-1
reference_type
scores
url https://usn.ubuntu.com/2985-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-8?distro=trixie
purl pkg:deb/debian/glibc@2.21-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8778
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-weg2-kxcj-fkcg
138
url VCID-wj8t-9j8k-wuap
vulnerability_id VCID-wj8t-9j8k-wuap
summary security flaw
references
0
reference_url ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39
reference_id
reference_type
scores
url ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39
1
reference_url ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37
reference_id
reference_type
scores
url ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37
2
reference_url ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc
reference_id
reference_type
scores
url ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I/
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I/
4
reference_url http://archives.neohapsis.com/archives/aix/2002-q3/0001.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/aix/2002-q3/0001.html
5
reference_url http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html
6
reference_url http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html
7
reference_url http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507
reference_id
reference_type
scores
url http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507
8
reference_url http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038
reference_id
reference_type
scores
url http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038
9
reference_url http://marc.info/?l=bugtraq&m=102513011311504&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=102513011311504&w=2
10
reference_url http://marc.info/?l=bugtraq&m=102520962320134&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=102520962320134&w=2
11
reference_url http://marc.info/?l=bugtraq&m=102579743329251&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=102579743329251&w=2
12
reference_url http://rhn.redhat.com/errata/RHSA-2002-139.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2002-139.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0651.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0651.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0651
reference_id
reference_type
scores
0
value 0.07259
scoring_system epss
scoring_elements 0.91651
published_at 2026-04-18T12:55:00Z
1
value 0.07259
scoring_system epss
scoring_elements 0.91594
published_at 2026-04-01T12:55:00Z
2
value 0.07259
scoring_system epss
scoring_elements 0.91602
published_at 2026-04-02T12:55:00Z
3
value 0.07259
scoring_system epss
scoring_elements 0.91608
published_at 2026-04-04T12:55:00Z
4
value 0.07259
scoring_system epss
scoring_elements 0.91616
published_at 2026-04-07T12:55:00Z
5
value 0.07259
scoring_system epss
scoring_elements 0.91629
published_at 2026-04-08T12:55:00Z
6
value 0.07259
scoring_system epss
scoring_elements 0.91635
published_at 2026-04-09T12:55:00Z
7
value 0.07259
scoring_system epss
scoring_elements 0.91638
published_at 2026-04-11T12:55:00Z
8
value 0.07259
scoring_system epss
scoring_elements 0.91641
published_at 2026-04-12T12:55:00Z
9
value 0.07259
scoring_system epss
scoring_elements 0.91637
published_at 2026-04-13T12:55:00Z
10
value 0.07259
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0651
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4190
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4190
17
reference_url http://www.cert.org/advisories/CA-2002-19.html
reference_id
reference_type
scores
url http://www.cert.org/advisories/CA-2002-19.html
18
reference_url http://www.iss.net/security_center/static/9432.php
reference_id
reference_type
scores
url http://www.iss.net/security_center/static/9432.php
19
reference_url http://www.kb.cert.org/vuls/id/803539
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/803539
20
reference_url http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-043.php
reference_id
reference_type
scores
url http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-043.php
21
reference_url http://www.pine.nl/advisories/pine-cert-20020601.txt
reference_id
reference_type
scores
url http://www.pine.nl/advisories/pine-cert-20020601.txt
22
reference_url http://www.redhat.com/support/errata/RHSA-2002-119.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2002-119.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2002-133.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2002-133.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2002-167.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2002-167.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2003-154.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2003-154.html
26
reference_url http://www.securityfocus.com/bid/5100
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/5100
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616785
reference_id 1616785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616785
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-0651
reference_id CVE-2002-0651
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2002-0651
30
reference_url https://access.redhat.com/errata/RHSA-2002:119
reference_id RHSA-2002:119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:119
31
reference_url https://access.redhat.com/errata/RHSA-2002:133
reference_id RHSA-2002:133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:133
32
reference_url https://access.redhat.com/errata/RHSA-2002:139
reference_id RHSA-2002:139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:139
33
reference_url https://access.redhat.com/errata/RHSA-2002:167
reference_id RHSA-2002:167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:167
34
reference_url https://access.redhat.com/errata/RHSA-2003:154
reference_id RHSA-2003:154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:154
fixed_packages
0
url pkg:deb/debian/glibc@2.2.5-8?distro=trixie
purl pkg:deb/debian/glibc@2.2.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2002-0651
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj8t-9j8k-wuap
139
url VCID-wp12-z5a5-pbgd
vulnerability_id VCID-wp12-z5a5-pbgd
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16997
reference_id
reference_type
scores
0
value 0.00878
scoring_system epss
scoring_elements 0.75266
published_at 2026-04-01T12:55:00Z
1
value 0.00878
scoring_system epss
scoring_elements 0.75368
published_at 2026-04-18T12:55:00Z
2
value 0.00878
scoring_system epss
scoring_elements 0.75355
published_at 2026-04-11T12:55:00Z
3
value 0.00878
scoring_system epss
scoring_elements 0.75333
published_at 2026-04-12T12:55:00Z
4
value 0.00878
scoring_system epss
scoring_elements 0.75322
published_at 2026-04-13T12:55:00Z
5
value 0.00878
scoring_system epss
scoring_elements 0.75362
published_at 2026-04-16T12:55:00Z
6
value 0.00878
scoring_system epss
scoring_elements 0.7527
published_at 2026-04-02T12:55:00Z
7
value 0.00878
scoring_system epss
scoring_elements 0.75302
published_at 2026-04-04T12:55:00Z
8
value 0.00878
scoring_system epss
scoring_elements 0.7528
published_at 2026-04-07T12:55:00Z
9
value 0.00878
scoring_system epss
scoring_elements 0.75323
published_at 2026-04-08T12:55:00Z
10
value 0.00878
scoring_system epss
scoring_elements 0.75334
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16997
3
reference_url https://bugs.debian.org/884615
reference_id
reference_type
scores
url https://bugs.debian.org/884615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22625
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22625
7
reference_url https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
reference_id
reference_type
scores
url https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
8
reference_url http://www.securityfocus.com/bid/102228
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102228
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1526865
reference_id 1526865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1526865
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615
reference_id 884615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16997
reference_id CVE-2017-16997
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16997
22
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
23
reference_url https://access.redhat.com/errata/RHSA-2018:3092
reference_id RHSA-2018:3092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3092
24
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.25-6?distro=trixie
purl pkg:deb/debian/glibc@2.25-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-6%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-16997
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wp12-z5a5-pbgd
140
url VCID-wp18-zqr6-a3ag
vulnerability_id VCID-wp18-zqr6-a3ag
summary Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23219
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59469
published_at 2026-04-16T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.59476
published_at 2026-04-18T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.65785
published_at 2026-04-13T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65815
published_at 2026-04-12T12:55:00Z
4
value 0.00523
scoring_system epss
scoring_elements 0.66885
published_at 2026-04-07T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.66886
published_at 2026-04-02T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66912
published_at 2026-04-04T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.66934
published_at 2026-04-08T12:55:00Z
8
value 0.00523
scoring_system epss
scoring_elements 0.66967
published_at 2026-04-11T12:55:00Z
9
value 0.00523
scoring_system epss
scoring_elements 0.66947
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23219
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2042017
reference_id 2042017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2042017
5
reference_url https://security.gentoo.org/glsa/202208-24
reference_id GLSA-202208-24
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/
url https://security.gentoo.org/glsa/202208-24
6
reference_url https://access.redhat.com/errata/RHSA-2022:0896
reference_id RHSA-2022:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0896
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22542
reference_id show_bug.cgi?id=22542
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=22542
8
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
9
reference_url https://usn.ubuntu.com/5310-2/
reference_id USN-5310-2
reference_type
scores
url https://usn.ubuntu.com/5310-2/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.33-3?distro=trixie
purl pkg:deb/debian/glibc@2.33-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-3%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2022-23219
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wp18-zqr6-a3ag
141
url VCID-ww2m-6691-yfa7
vulnerability_id VCID-ww2m-6691-yfa7
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000001
reference_id
reference_type
scores
0
value 0.41417
scoring_system epss
scoring_elements 0.97412
published_at 2026-04-18T12:55:00Z
1
value 0.41417
scoring_system epss
scoring_elements 0.97399
published_at 2026-04-11T12:55:00Z
2
value 0.41417
scoring_system epss
scoring_elements 0.974
published_at 2026-04-12T12:55:00Z
3
value 0.41417
scoring_system epss
scoring_elements 0.97401
published_at 2026-04-13T12:55:00Z
4
value 0.41417
scoring_system epss
scoring_elements 0.97409
published_at 2026-04-16T12:55:00Z
5
value 0.41417
scoring_system epss
scoring_elements 0.9739
published_at 2026-04-07T12:55:00Z
6
value 0.41417
scoring_system epss
scoring_elements 0.97396
published_at 2026-04-08T12:55:00Z
7
value 0.41417
scoring_system epss
scoring_elements 0.97397
published_at 2026-04-09T12:55:00Z
8
value 0.44049
scoring_system epss
scoring_elements 0.97524
published_at 2026-04-02T12:55:00Z
9
value 0.44049
scoring_system epss
scoring_elements 0.97527
published_at 2026-04-04T12:55:00Z
10
value 0.44049
scoring_system epss
scoring_elements 0.97518
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1533836
reference_id 1533836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1533836
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001
reference_id 887001
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001
5
reference_url https://security.archlinux.org/ASA-201801-18
reference_id ASA-201801-18
reference_type
scores
url https://security.archlinux.org/ASA-201801-18
6
reference_url https://security.archlinux.org/ASA-201801-19
reference_id ASA-201801-19
reference_type
scores
url https://security.archlinux.org/ASA-201801-19
7
reference_url https://security.archlinux.org/AVG-590
reference_id AVG-590
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-590
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb
10
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb
11
reference_url https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
reference_id CVE-2018-1000001
reference_type exploit
scores
url https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
12
reference_url https://security.gentoo.org/glsa/201804-02
reference_id GLSA-201804-02
reference_type
scores
url https://security.gentoo.org/glsa/201804-02
13
reference_url https://access.redhat.com/errata/RHSA-2018:0805
reference_id RHSA-2018:0805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0805
14
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
15
reference_url https://usn.ubuntu.com/3536-1/
reference_id USN-3536-1
reference_type
scores
url https://usn.ubuntu.com/3536-1/
16
reference_url https://usn.ubuntu.com/USN-4768-1/
reference_id USN-USN-4768-1
reference_type
scores
url https://usn.ubuntu.com/USN-4768-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.26-4?distro=trixie
purl pkg:deb/debian/glibc@2.26-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.26-4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2018-1000001
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ww2m-6691-yfa7
142
url VCID-xhcm-t8jb-ybfb
vulnerability_id VCID-xhcm-t8jb-ybfb
summary Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-33602
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63673
published_at 2026-04-18T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63607
published_at 2026-04-02T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63633
published_at 2026-04-04T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63592
published_at 2026-04-07T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63644
published_at 2026-04-08T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63661
published_at 2026-04-09T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-11T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.6366
published_at 2026-04-12T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63627
published_at 2026-04-13T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63664
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-33602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2277206
reference_id 2277206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2277206
8
reference_url http://www.openwall.com/lists/oss-security/2024/07/22/5
reference_id 5
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url http://www.openwall.com/lists/oss-security/2024/07/22/5
9
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008
reference_id GLIBC-SA-2024-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008
10
reference_url https://security.gentoo.org/glsa/202405-17
reference_id GLSA-202405-17
reference_type
scores
url https://security.gentoo.org/glsa/202405-17
11
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20240524-0012/
reference_id ntap-20240524-0012
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/
url https://security.netapp.com/advisory/ntap-20240524-0012/
13
reference_url https://access.redhat.com/errata/RHSA-2024:2799
reference_id RHSA-2024:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2799
14
reference_url https://access.redhat.com/errata/RHSA-2024:3309
reference_id RHSA-2024:3309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3309
15
reference_url https://access.redhat.com/errata/RHSA-2024:3312
reference_id RHSA-2024:3312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3312
16
reference_url https://access.redhat.com/errata/RHSA-2024:3339
reference_id RHSA-2024:3339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3339
17
reference_url https://access.redhat.com/errata/RHSA-2024:3344
reference_id RHSA-2024:3344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3344
18
reference_url https://access.redhat.com/errata/RHSA-2024:3411
reference_id RHSA-2024:3411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3411
19
reference_url https://access.redhat.com/errata/RHSA-2024:3423
reference_id RHSA-2024:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3423
20
reference_url https://access.redhat.com/errata/RHSA-2024:3464
reference_id RHSA-2024:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3464
21
reference_url https://access.redhat.com/errata/RHSA-2024:3588
reference_id RHSA-2024:3588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3588
22
reference_url https://access.redhat.com/errata/RHSA-2024:4126
reference_id RHSA-2024:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4126
23
reference_url https://usn.ubuntu.com/6804-1/
reference_id USN-6804-1
reference_type
scores
url https://usn.ubuntu.com/6804-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.37-19?distro=trixie
purl pkg:deb/debian/glibc@2.37-19?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2024-33602
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb
143
url VCID-xyvn-w5ac-yqcn
vulnerability_id VCID-xyvn-w5ac-yqcn
summary glibc: multiple overflows in strxfrm()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8982
reference_id
reference_type
scores
0
value 0.0131
scoring_system epss
scoring_elements 0.79824
published_at 2026-04-18T12:55:00Z
1
value 0.0131
scoring_system epss
scoring_elements 0.79795
published_at 2026-04-13T12:55:00Z
2
value 0.0131
scoring_system epss
scoring_elements 0.79823
published_at 2026-04-16T12:55:00Z
3
value 0.0131
scoring_system epss
scoring_elements 0.79746
published_at 2026-04-01T12:55:00Z
4
value 0.0131
scoring_system epss
scoring_elements 0.79754
published_at 2026-04-02T12:55:00Z
5
value 0.0131
scoring_system epss
scoring_elements 0.79775
published_at 2026-04-04T12:55:00Z
6
value 0.0131
scoring_system epss
scoring_elements 0.79761
published_at 2026-04-07T12:55:00Z
7
value 0.0131
scoring_system epss
scoring_elements 0.7979
published_at 2026-04-08T12:55:00Z
8
value 0.0131
scoring_system epss
scoring_elements 0.79797
published_at 2026-04-09T12:55:00Z
9
value 0.0131
scoring_system epss
scoring_elements 0.79819
published_at 2026-04-11T12:55:00Z
10
value 0.0131
scoring_system epss
scoring_elements 0.79803
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8982
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=16009
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=16009
7
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
8
reference_url http://www.openwall.com/lists/oss-security/2015/02/13/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/02/13/3
9
reference_url http://www.openwall.com/lists/oss-security/2017/02/14/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/02/14/9
10
reference_url http://www.securityfocus.com/bid/72602
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/72602
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1192525
reference_id 1192525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1192525
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927
reference_id 803927
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8982
reference_id CVE-2015-8982
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8982
15
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.21-1?distro=trixie
purl pkg:deb/debian/glibc@2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-8982
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyvn-w5ac-yqcn
144
url VCID-y19v-br6n-3ybf
vulnerability_id VCID-y19v-br6n-3ybf
summary
Multiple vulnerabilities have been found in GNU C Library, the
    worst of which allowing arbitrary code execution and privilege escalation.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=330923
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=330923
1
reference_url http://openwall.com/lists/oss-security/2011/03/08/21
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/21
2
reference_url http://openwall.com/lists/oss-security/2011/03/08/22
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/22
3
reference_url http://openwall.com/lists/oss-security/2011/03/08/8
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/08/8
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1095.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1095.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1095
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24946
published_at 2026-04-18T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25018
published_at 2026-04-01T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25095
published_at 2026-04-02T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25133
published_at 2026-04-04T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24908
published_at 2026-04-07T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24976
published_at 2026-04-08T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-09T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25035
published_at 2026-04-11T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24995
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-13T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24954
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1095
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095
7
reference_url http://secunia.com/advisories/43830
reference_id
reference_type
scores
url http://secunia.com/advisories/43830
8
reference_url http://secunia.com/advisories/43976
reference_id
reference_type
scores
url http://secunia.com/advisories/43976
9
reference_url http://secunia.com/advisories/43989
reference_id
reference_type
scores
url http://secunia.com/advisories/43989
10
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
11
reference_url http://security.gentoo.org/glsa/glsa-201011-01.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201011-01.xml
12
reference_url http://securitytracker.com/id?1025286
reference_id
reference_type
scores
url http://securitytracker.com/id?1025286
13
reference_url http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904
reference_id
reference_type
scores
url http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904
14
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=11904
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=11904
15
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=patch%3Bh=026373745eab50a683536d950cb7e17dc98c4259
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=patch%3Bh=026373745eab50a683536d950cb7e17dc98c4259
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12272
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12272
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0412.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0412.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2011-0413.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0413.html
20
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2011/0863
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0863
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625893
reference_id 625893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625893
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1095
reference_id CVE-2011-1095
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1095
82
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
83
reference_url https://access.redhat.com/errata/RHSA-2011:0412
reference_id RHSA-2011:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0412
84
reference_url https://access.redhat.com/errata/RHSA-2011:0413
reference_id RHSA-2011:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0413
85
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
86
reference_url https://usn.ubuntu.com/1396-1/
reference_id USN-1396-1
reference_type
scores
url https://usn.ubuntu.com/1396-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.13-16?distro=trixie
purl pkg:deb/debian/glibc@2.13-16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-16%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2011-1095
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y19v-br6n-3ybf
145
url VCID-ydrg-f673-53gv
vulnerability_id VCID-ydrg-f673-53gv
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4332
reference_id
reference_type
scores
0
value 0.01645
scoring_system epss
scoring_elements 0.81904
published_at 2026-04-01T12:55:00Z
1
value 0.01645
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-02T12:55:00Z
2
value 0.01645
scoring_system epss
scoring_elements 0.81938
published_at 2026-04-04T12:55:00Z
3
value 0.01645
scoring_system epss
scoring_elements 0.81934
published_at 2026-04-07T12:55:00Z
4
value 0.01645
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-08T12:55:00Z
5
value 0.01645
scoring_system epss
scoring_elements 0.81968
published_at 2026-04-09T12:55:00Z
6
value 0.01645
scoring_system epss
scoring_elements 0.81988
published_at 2026-04-11T12:55:00Z
7
value 0.01645
scoring_system epss
scoring_elements 0.81976
published_at 2026-04-12T12:55:00Z
8
value 0.01645
scoring_system epss
scoring_elements 0.81971
published_at 2026-04-13T12:55:00Z
9
value 0.01645
scoring_system epss
scoring_elements 0.82007
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1007545
reference_id 1007545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1007545
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536
reference_id 722536
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2013:1411
reference_id RHSA-2013:1411
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1411
7
reference_url https://access.redhat.com/errata/RHSA-2013:1605
reference_id RHSA-2013:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1605
8
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.17-93?distro=trixie
purl pkg:deb/debian/glibc@2.17-93?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-93%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-4332
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrg-f673-53gv
146
url VCID-yh8v-ebxn-z7dp
vulnerability_id VCID-yh8v-ebxn-z7dp
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4237
reference_id
reference_type
scores
0
value 0.01052
scoring_system epss
scoring_elements 0.77497
published_at 2026-04-01T12:55:00Z
1
value 0.01052
scoring_system epss
scoring_elements 0.77503
published_at 2026-04-02T12:55:00Z
2
value 0.01052
scoring_system epss
scoring_elements 0.77528
published_at 2026-04-04T12:55:00Z
3
value 0.01052
scoring_system epss
scoring_elements 0.77508
published_at 2026-04-07T12:55:00Z
4
value 0.01052
scoring_system epss
scoring_elements 0.77538
published_at 2026-04-08T12:55:00Z
5
value 0.01052
scoring_system epss
scoring_elements 0.77547
published_at 2026-04-09T12:55:00Z
6
value 0.01052
scoring_system epss
scoring_elements 0.77573
published_at 2026-04-11T12:55:00Z
7
value 0.01052
scoring_system epss
scoring_elements 0.77558
published_at 2026-04-12T12:55:00Z
8
value 0.01052
scoring_system epss
scoring_elements 0.77556
published_at 2026-04-13T12:55:00Z
9
value 0.01052
scoring_system epss
scoring_elements 0.77594
published_at 2026-04-16T12:55:00Z
10
value 0.01052
scoring_system epss
scoring_elements 0.77592
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4237
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558
reference_id 719558
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=995839
reference_id 995839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=995839
5
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
6
reference_url https://access.redhat.com/errata/RHSA-2014:1391
reference_id RHSA-2014:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1391
7
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.17-94?distro=trixie
purl pkg:deb/debian/glibc@2.17-94?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-4237
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yh8v-ebxn-z7dp
147
url VCID-ys5d-7xgp-w7g5
vulnerability_id VCID-ys5d-7xgp-w7g5
summary A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0395
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21846
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21718
published_at 2026-04-18T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21899
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21664
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21798
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21808
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21768
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/pipermail/libc-announce/2025/000044.html
reference_id 000044.html
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://sourceware.org/pipermail/libc-announce/2025/000044.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2339460
reference_id 2339460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2339460
6
reference_url https://www.openwall.com/lists/oss-security/2025/01/22/4
reference_id 4
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://www.openwall.com/lists/oss-security/2025/01/22/4
7
reference_url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
reference_id GLIBC-SA-2025-0001
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
8
reference_url https://security.gentoo.org/glsa/202505-06
reference_id GLSA-202505-06
reference_type
scores
url https://security.gentoo.org/glsa/202505-06
9
reference_url https://access.redhat.com/errata/RHSA-2025:3828
reference_id RHSA-2025:3828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3828
10
reference_url https://access.redhat.com/errata/RHSA-2025:4241
reference_id RHSA-2025:4241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4241
11
reference_url https://access.redhat.com/errata/RHSA-2025:4242
reference_id RHSA-2025:4242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4242
12
reference_url https://access.redhat.com/errata/RHSA-2025:4243
reference_id RHSA-2025:4243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4243
13
reference_url https://access.redhat.com/errata/RHSA-2025:4244
reference_id RHSA-2025:4244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4244
14
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32582
reference_id show_bug.cgi?id=32582
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32582
15
reference_url https://usn.ubuntu.com/7259-1/
reference_id USN-7259-1
reference_type
scores
url https://usn.ubuntu.com/7259-1/
16
reference_url https://usn.ubuntu.com/7259-2/
reference_id USN-7259-2
reference_type
scores
url https://usn.ubuntu.com/7259-2/
17
reference_url https://usn.ubuntu.com/7259-3/
reference_id USN-7259-3
reference_type
scores
url https://usn.ubuntu.com/7259-3/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u12?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u12%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.40-6?distro=trixie
purl pkg:deb/debian/glibc@2.40-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.40-6%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
7
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
8
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2025-0395
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5
148
url VCID-ywmm-hzmg-z3b4
vulnerability_id VCID-ywmm-hzmg-z3b4
summary security update
references
0
reference_url http://linux.oracle.com/errata/ELSA-2015-0016.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2015-0016.html
1
reference_url http://linux.oracle.com/errata/ELSA-2015-0092.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2015-0092.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-2023.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-2023.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7817
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36625
published_at 2026-04-18T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36536
published_at 2026-04-01T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36708
published_at 2026-04-02T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36739
published_at 2026-04-04T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36577
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.3663
published_at 2026-04-08T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36647
published_at 2026-04-09T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36655
published_at 2026-04-11T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36621
published_at 2026-04-12T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36596
published_at 2026-04-13T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36642
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7817
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
10
reference_url http://seclists.org/oss-sec/2014/q4/730
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2014/q4/730
11
reference_url http://secunia.com/advisories/62100
reference_id
reference_type
scores
url http://secunia.com/advisories/62100
12
reference_url http://secunia.com/advisories/62146
reference_id
reference_type
scores
url http://secunia.com/advisories/62146
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/98852
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/98852
14
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=17625
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=17625
15
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c
16
reference_url https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html
reference_id
reference_type
scores
url https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html
17
reference_url http://www.debian.org/security/2015/dsa-3142
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3142
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url http://www.securityfocus.com/bid/71216
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71216
21
reference_url http://www.ubuntu.com/usn/USN-2432-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2432-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1157689
reference_id 1157689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1157689
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572
reference_id 775572
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7817
reference_id CVE-2014-7817
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-7817
33
reference_url https://security.gentoo.org/glsa/201602-02
reference_id GLSA-201602-02
reference_type
scores
url https://security.gentoo.org/glsa/201602-02
34
reference_url https://access.redhat.com/errata/RHSA-2014:2023
reference_id RHSA-2014:2023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:2023
35
reference_url https://access.redhat.com/errata/RHSA-2015:0016
reference_id RHSA-2015:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0016
36
reference_url https://usn.ubuntu.com/2432-1/
reference_id USN-2432-1
reference_type
scores
url https://usn.ubuntu.com/2432-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.19-14?distro=trixie
purl pkg:deb/debian/glibc@2.19-14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2014-7817
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ywmm-hzmg-z3b4
149
url VCID-z2xd-8n4a-b3cp
vulnerability_id VCID-z2xd-8n4a-b3cp
summary glibc: per-thread memory leak in __res_vinit with IPv6 nameservers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5417
reference_id
reference_type
scores
0
value 0.01185
scoring_system epss
scoring_elements 0.78734
published_at 2026-04-01T12:55:00Z
1
value 0.01185
scoring_system epss
scoring_elements 0.78741
published_at 2026-04-02T12:55:00Z
2
value 0.01185
scoring_system epss
scoring_elements 0.78772
published_at 2026-04-04T12:55:00Z
3
value 0.01185
scoring_system epss
scoring_elements 0.78755
published_at 2026-04-07T12:55:00Z
4
value 0.01185
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-08T12:55:00Z
5
value 0.01185
scoring_system epss
scoring_elements 0.78787
published_at 2026-04-09T12:55:00Z
6
value 0.01185
scoring_system epss
scoring_elements 0.78811
published_at 2026-04-11T12:55:00Z
7
value 0.01185
scoring_system epss
scoring_elements 0.78794
published_at 2026-04-12T12:55:00Z
8
value 0.01185
scoring_system epss
scoring_elements 0.78785
published_at 2026-04-13T12:55:00Z
9
value 0.01185
scoring_system epss
scoring_elements 0.78813
published_at 2026-04-16T12:55:00Z
10
value 0.01185
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362534
reference_id 1362534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362534
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302
reference_id 833302
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302
5
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.22-4?distro=trixie
purl pkg:deb/debian/glibc@2.22-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-4%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2016-5417
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z2xd-8n4a-b3cp
150
url VCID-z55w-t8kd-hqep
vulnerability_id VCID-z55w-t8kd-hqep
summary glibc: Integer overflow with enabled tcache
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17426.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17426
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.57899
published_at 2026-04-01T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58039
published_at 2026-04-18T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.5801
published_at 2026-04-13T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.5804
published_at 2026-04-16T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.57983
published_at 2026-04-02T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58002
published_at 2026-04-04T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.57978
published_at 2026-04-07T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.58033
published_at 2026-04-08T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58035
published_at 2026-04-09T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58052
published_at 2026-04-11T12:55:00Z
10
value 0.00358
scoring_system epss
scoring_elements 0.58031
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17426
2
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22375
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22375
3
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=34697694e8a93b325b18f25f7dcded55d6baeaf6
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=34697694e8a93b325b18f25f7dcded55d6baeaf6
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524530
reference_id 1524530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524530
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17426
reference_id CVE-2017-17426
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17426
7
reference_url https://usn.ubuntu.com/3534-1/
reference_id USN-3534-1
reference_type
scores
url https://usn.ubuntu.com/3534-1/
fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2017-17426
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z55w-t8kd-hqep
151
url VCID-za5g-uj5p-5kd4
vulnerability_id VCID-za5g-uj5p-5kd4
summary
Multiple vulnerabilities have been found in GNU C Library,  the
    worst of which allowing a local attacker to execute arbitrary code or cause
    a Denial of Service .
references
0
reference_url http://osvdb.org/89747
reference_id
reference_type
scores
url http://osvdb.org/89747
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0769.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0769.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1605.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1605.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0242
reference_id
reference_type
scores
0
value 0.02113
scoring_system epss
scoring_elements 0.84136
published_at 2026-04-18T12:55:00Z
1
value 0.02113
scoring_system epss
scoring_elements 0.84044
published_at 2026-04-01T12:55:00Z
2
value 0.02113
scoring_system epss
scoring_elements 0.84057
published_at 2026-04-02T12:55:00Z
3
value 0.02113
scoring_system epss
scoring_elements 0.84073
published_at 2026-04-04T12:55:00Z
4
value 0.02113
scoring_system epss
scoring_elements 0.84075
published_at 2026-04-07T12:55:00Z
5
value 0.02113
scoring_system epss
scoring_elements 0.84098
published_at 2026-04-08T12:55:00Z
6
value 0.02113
scoring_system epss
scoring_elements 0.84105
published_at 2026-04-09T12:55:00Z
7
value 0.02113
scoring_system epss
scoring_elements 0.84122
published_at 2026-04-11T12:55:00Z
8
value 0.02113
scoring_system epss
scoring_elements 0.84116
published_at 2026-04-12T12:55:00Z
9
value 0.02113
scoring_system epss
scoring_elements 0.84112
published_at 2026-04-13T12:55:00Z
10
value 0.02113
scoring_system epss
scoring_elements 0.84134
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0242
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
6
reference_url http://secunia.com/advisories/51951
reference_id
reference_type
scores
url http://secunia.com/advisories/51951
7
reference_url http://secunia.com/advisories/55113
reference_id
reference_type
scores
url http://secunia.com/advisories/55113
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/81707
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/81707
9
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=15078
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=15078
10
reference_url http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html
reference_id
reference_type
scores
url http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
12
reference_url http://www.openwall.com/lists/oss-security/2013/01/30/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/01/30/5
13
reference_url http://www.securityfocus.com/bid/57638
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57638
14
reference_url http://www.securitytracker.com/id/1028063
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028063
15
reference_url http://www.ubuntu.com/usn/USN-1991-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1991-1
16
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0008.html
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399
reference_id 699399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=905874
reference_id 905874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=905874
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0242
reference_id CVE-2013-0242
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0242
21
reference_url https://security.gentoo.org/glsa/201503-04
reference_id GLSA-201503-04
reference_type
scores
url https://security.gentoo.org/glsa/201503-04
22
reference_url https://access.redhat.com/errata/RHSA-2013:0769
reference_id RHSA-2013:0769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0769
23
reference_url https://access.redhat.com/errata/RHSA-2013:1605
reference_id RHSA-2013:1605
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1605
24
reference_url https://usn.ubuntu.com/1991-1/
reference_id USN-1991-1
reference_type
scores
url https://usn.ubuntu.com/1991-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.17-2?distro=trixie
purl pkg:deb/debian/glibc@2.17-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2013-0242
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4
152
url VCID-zhzd-f8a6-juaa
vulnerability_id VCID-zhzd-f8a6-juaa
summary
Multiple vulnerabilities have been found in GNU C Library, the
    worst of which allowing arbitrary code execution and privilege escalation.
references
0
reference_url http://code.google.com/p/chromium/issues/detail?id=48733
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=48733
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1659.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1659
reference_id
reference_type
scores
0
value 0.02476
scoring_system epss
scoring_elements 0.85304
published_at 2026-04-18T12:55:00Z
1
value 0.02476
scoring_system epss
scoring_elements 0.85211
published_at 2026-04-01T12:55:00Z
2
value 0.02476
scoring_system epss
scoring_elements 0.85222
published_at 2026-04-02T12:55:00Z
3
value 0.02476
scoring_system epss
scoring_elements 0.85241
published_at 2026-04-04T12:55:00Z
4
value 0.02476
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-07T12:55:00Z
5
value 0.02476
scoring_system epss
scoring_elements 0.85265
published_at 2026-04-08T12:55:00Z
6
value 0.02476
scoring_system epss
scoring_elements 0.85273
published_at 2026-04-09T12:55:00Z
7
value 0.02476
scoring_system epss
scoring_elements 0.85287
published_at 2026-04-11T12:55:00Z
8
value 0.02476
scoring_system epss
scoring_elements 0.85285
published_at 2026-04-12T12:55:00Z
9
value 0.02476
scoring_system epss
scoring_elements 0.85282
published_at 2026-04-13T12:55:00Z
10
value 0.02476
scoring_system epss
scoring_elements 0.85303
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1659
3
reference_url http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html
reference_id
reference_type
scores
url http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659
5
reference_url http://secunia.com/advisories/44353
reference_id
reference_type
scores
url http://secunia.com/advisories/44353
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66819
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66819
8
reference_url http://sourceware.org/bugzilla/show_bug.cgi?id=12583
reference_id
reference_type
scores
url http://sourceware.org/bugzilla/show_bug.cgi?id=12583
9
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=8126d90480fa3e0c5c5cd0d02cb1c93174b45485
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=8126d90480fa3e0c5c5cd0d02cb1c93174b45485
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
12
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
13
reference_url http://www.securitytracker.com/id?1025450
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025450
14
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=681054
reference_id 681054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=681054
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1659
reference_id CVE-2011-1659
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1659
75
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
76
reference_url https://access.redhat.com/errata/RHSA-2011:0412
reference_id RHSA-2011:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0412
77
reference_url https://access.redhat.com/errata/RHSA-2011:0413
reference_id RHSA-2011:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0413
78
reference_url https://access.redhat.com/errata/RHSA-2012:0125
reference_id RHSA-2012:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0125
79
reference_url https://usn.ubuntu.com/1396-1/
reference_id USN-1396-1
reference_type
scores
url https://usn.ubuntu.com/1396-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.13-8?distro=trixie
purl pkg:deb/debian/glibc@2.13-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-8%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2011-1659
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhzd-f8a6-juaa
153
url VCID-zk4w-q3pr-myh6
vulnerability_id VCID-zk4w-q3pr-myh6
summary glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with "**(!()" pattern
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-20109
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-01T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08384
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0828
published_at 2026-04-18T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08404
published_at 2026-04-13T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08296
published_at 2026-04-16T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08436
published_at 2026-04-04T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08359
published_at 2026-04-07T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08429
published_at 2026-04-08T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08446
published_at 2026-04-09T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08439
published_at 2026-04-11T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-20109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2217330
reference_id 2217330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2217330
4
reference_url https://security.netapp.com/advisory/ntap-20230731-0009/
reference_id ntap-20230731-0009
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/
url https://security.netapp.com/advisory/ntap-20230731-0009/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18036
reference_id show_bug.cgi?id=18036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=18036
6
reference_url https://usn.ubuntu.com/6762-1/
reference_id USN-6762-1
reference_type
scores
url https://usn.ubuntu.com/6762-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.22-1?distro=trixie
purl pkg:deb/debian/glibc@2.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-1%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2015-20109
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zk4w-q3pr-myh6
154
url VCID-zn6t-3mvb-wufm
vulnerability_id VCID-zn6t-3mvb-wufm
summary glibc: Integer overflow in memalign leads to heap corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0861.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0861
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.0115
published_at 2026-04-02T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01144
published_at 2026-04-16T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01172
published_at 2026-04-08T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01173
published_at 2026-04-09T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01159
published_at 2026-04-11T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01152
published_at 2026-04-12T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01156
published_at 2026-04-18T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01157
published_at 2026-04-04T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01166
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125678
reference_id 1125678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125678
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429771
reference_id 2429771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429771
6
reference_url https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001
reference_id GLIBC-SA-2026-0001
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-14T21:24:01Z/
url https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001
7
reference_url https://access.redhat.com/errata/RHSA-2026:1334
reference_id RHSA-2026:1334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1334
8
reference_url https://access.redhat.com/errata/RHSA-2026:2786
reference_id RHSA-2026:2786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2786
9
reference_url https://access.redhat.com/errata/RHSA-2026:3228
reference_id RHSA-2026:3228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3228
10
reference_url https://access.redhat.com/errata/RHSA-2026:4501
reference_id RHSA-2026:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4501
11
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4655
12
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
13
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5606
14
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33796
reference_id show_bug.cgi?id=33796
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-14T21:24:01Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33796
15
reference_url https://usn.ubuntu.com/8005-1/
reference_id USN-8005-1
reference_type
scores
url https://usn.ubuntu.com/8005-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.42-8?distro=trixie
purl pkg:deb/debian/glibc@2.42-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-8%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2026-0861
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn6t-3mvb-wufm
155
url VCID-zqx5-4rdk-1qa3
vulnerability_id VCID-zqx5-4rdk-1qa3
summary
Multiple vulnerabilities in glibc could result in Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27645
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11077
published_at 2026-04-01T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11057
published_at 2026-04-18T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.1122
published_at 2026-04-02T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11283
published_at 2026-04-04T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11096
published_at 2026-04-07T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11176
published_at 2026-04-08T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11232
published_at 2026-04-09T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11242
published_at 2026-04-11T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11209
published_at 2026-04-12T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11184
published_at 2026-04-13T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.11048
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27645
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1932589
reference_id 1932589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1932589
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
reference_id 7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479
reference_id 983479
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479
7
reference_url https://security.archlinux.org/AVG-1621
reference_id AVG-1621
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1621
8
reference_url https://security.gentoo.org/glsa/202107-07
reference_id GLSA-202107-07
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/
url https://security.gentoo.org/glsa/202107-07
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
reference_id I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
10
reference_url https://access.redhat.com/errata/RHSA-2021:4358
reference_id RHSA-2021:4358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4358
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=27462
reference_id show_bug.cgi?id=27462
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=27462
12
reference_url https://usn.ubuntu.com/5310-1/
reference_id USN-5310-1
reference_type
scores
url https://usn.ubuntu.com/5310-1/
fixed_packages
0
url pkg:deb/debian/glibc@2.31-10?distro=trixie
purl pkg:deb/debian/glibc@2.31-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-10%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
aliases CVE-2021-27645
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie