Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/klibc@2.0.14-1?distro=trixie
Typedeb
Namespacedebian
Nameklibc
Version2.0.14-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-36y6-h6vw-xkc1
vulnerability_id VCID-36y6-h6vw-xkc1
summary An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31871
reference_id
reference_type
scores
0
value 0.01589
scoring_system epss
scoring_elements 0.81564
published_at 2026-04-01T12:55:00Z
1
value 0.01589
scoring_system epss
scoring_elements 0.81576
published_at 2026-04-02T12:55:00Z
2
value 0.01589
scoring_system epss
scoring_elements 0.81597
published_at 2026-04-04T12:55:00Z
3
value 0.01589
scoring_system epss
scoring_elements 0.81595
published_at 2026-04-07T12:55:00Z
4
value 0.01589
scoring_system epss
scoring_elements 0.81623
published_at 2026-04-08T12:55:00Z
5
value 0.01589
scoring_system epss
scoring_elements 0.81628
published_at 2026-04-13T12:55:00Z
6
value 0.01589
scoring_system epss
scoring_elements 0.81648
published_at 2026-04-11T12:55:00Z
7
value 0.01589
scoring_system epss
scoring_elements 0.81635
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31871
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31871
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6%3Fdistro=trixie
1
url pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1%3Fdistro=trixie
2
url pkg:deb/debian/klibc@2.0.12-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.12-1%3Fdistro=trixie
3
url pkg:deb/debian/klibc@2.0.14-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.14-1%3Fdistro=trixie
aliases CVE-2021-31871
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36y6-h6vw-xkc1
1
url VCID-c25w-wgnm-yyfj
vulnerability_id VCID-c25w-wgnm-yyfj
summary
A vulnerability in klibc could allow remote attackers to execute
    arbitrary shell code.
references
0
reference_url https://access.redhat.com/security/cve/cve-2011-1930
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2011-1930
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1930
reference_id
reference_type
scores
0
value 0.28991
scoring_system epss
scoring_elements 0.9657
published_at 2026-04-13T12:55:00Z
1
value 0.28991
scoring_system epss
scoring_elements 0.96567
published_at 2026-04-12T12:55:00Z
2
value 0.28991
scoring_system epss
scoring_elements 0.96538
published_at 2026-04-01T12:55:00Z
3
value 0.28991
scoring_system epss
scoring_elements 0.96546
published_at 2026-04-02T12:55:00Z
4
value 0.28991
scoring_system epss
scoring_elements 0.96552
published_at 2026-04-04T12:55:00Z
5
value 0.28991
scoring_system epss
scoring_elements 0.96554
published_at 2026-04-07T12:55:00Z
6
value 0.28991
scoring_system epss
scoring_elements 0.96562
published_at 2026-04-08T12:55:00Z
7
value 0.28991
scoring_system epss
scoring_elements 0.96564
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1930
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1930
3
reference_url http://security.gentoo.org/glsa/glsa-201309-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-21.xml
4
reference_url https://security-tracker.debian.org/tracker/CVE-2011-1930
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2011-1930
5
reference_url http://www.openwall.com/lists/oss-security/2012/05/22/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/05/22/12
6
reference_url http://www.securityfocus.com/bid/47924
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47924
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1930
reference_id CVE-2011-1930
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2011-1930
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35785.txt
reference_id CVE-2011-1930;OSVDB-73394
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35785.txt
13
reference_url https://www.securityfocus.com/bid/47924/info
reference_id CVE-2011-1930;OSVDB-73394
reference_type exploit
scores
url https://www.securityfocus.com/bid/47924/info
14
reference_url https://security.gentoo.org/glsa/201309-21
reference_id GLSA-201309-21
reference_type
scores
url https://security.gentoo.org/glsa/201309-21
fixed_packages
0
url pkg:deb/debian/klibc@1.5.22-1?distro=trixie
purl pkg:deb/debian/klibc@1.5.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@1.5.22-1%3Fdistro=trixie
1
url pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1%3Fdistro=trixie
2
url pkg:deb/debian/klibc@2.0.12-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.12-1%3Fdistro=trixie
3
url pkg:deb/debian/klibc@2.0.14-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.14-1%3Fdistro=trixie
aliases CVE-2011-1930
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c25w-wgnm-yyfj
2
url VCID-exyu-7j28-43ga
vulnerability_id VCID-exyu-7j28-43ga
summary An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31873
reference_id
reference_type
scores
0
value 0.00889
scoring_system epss
scoring_elements 0.75452
published_at 2026-04-01T12:55:00Z
1
value 0.00889
scoring_system epss
scoring_elements 0.75455
published_at 2026-04-02T12:55:00Z
2
value 0.00889
scoring_system epss
scoring_elements 0.75486
published_at 2026-04-04T12:55:00Z
3
value 0.00889
scoring_system epss
scoring_elements 0.75466
published_at 2026-04-07T12:55:00Z
4
value 0.00889
scoring_system epss
scoring_elements 0.75508
published_at 2026-04-08T12:55:00Z
5
value 0.00889
scoring_system epss
scoring_elements 0.75518
published_at 2026-04-09T12:55:00Z
6
value 0.00889
scoring_system epss
scoring_elements 0.75537
published_at 2026-04-11T12:55:00Z
7
value 0.00889
scoring_system epss
scoring_elements 0.75516
published_at 2026-04-12T12:55:00Z
8
value 0.00889
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31873
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31873
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6%3Fdistro=trixie
1
url pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1%3Fdistro=trixie
2
url pkg:deb/debian/klibc@2.0.12-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.12-1%3Fdistro=trixie
3
url pkg:deb/debian/klibc@2.0.14-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.14-1%3Fdistro=trixie
aliases CVE-2021-31873
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exyu-7j28-43ga
3
url VCID-s96y-8z6t-3yff
vulnerability_id VCID-s96y-8z6t-3yff
summary An issue was discovered in klibc before 2.0.9. Multiple possible integer overflows in the cpio command on 32-bit systems may result in a buffer overflow or other security impact.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31872
reference_id
reference_type
scores
0
value 0.01173
scoring_system epss
scoring_elements 0.78639
published_at 2026-04-01T12:55:00Z
1
value 0.01173
scoring_system epss
scoring_elements 0.78645
published_at 2026-04-02T12:55:00Z
2
value 0.01173
scoring_system epss
scoring_elements 0.78675
published_at 2026-04-04T12:55:00Z
3
value 0.01173
scoring_system epss
scoring_elements 0.78656
published_at 2026-04-07T12:55:00Z
4
value 0.01173
scoring_system epss
scoring_elements 0.78682
published_at 2026-04-08T12:55:00Z
5
value 0.01173
scoring_system epss
scoring_elements 0.78688
published_at 2026-04-09T12:55:00Z
6
value 0.01173
scoring_system epss
scoring_elements 0.78713
published_at 2026-04-11T12:55:00Z
7
value 0.01173
scoring_system epss
scoring_elements 0.78695
published_at 2026-04-12T12:55:00Z
8
value 0.01173
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31872
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31872
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6%3Fdistro=trixie
1
url pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1%3Fdistro=trixie
2
url pkg:deb/debian/klibc@2.0.12-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.12-1%3Fdistro=trixie
3
url pkg:deb/debian/klibc@2.0.14-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.14-1%3Fdistro=trixie
aliases CVE-2021-31872
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s96y-8z6t-3yff
4
url VCID-vm8g-v83d-mbfm
vulnerability_id VCID-vm8g-v83d-mbfm
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0001
reference_id
reference_type
scores
0
value 0.22601
scoring_system epss
scoring_elements 0.95813
published_at 2026-04-01T12:55:00Z
1
value 0.22601
scoring_system epss
scoring_elements 0.95822
published_at 2026-04-02T12:55:00Z
2
value 0.22601
scoring_system epss
scoring_elements 0.9583
published_at 2026-04-04T12:55:00Z
3
value 0.22601
scoring_system epss
scoring_elements 0.95832
published_at 2026-04-07T12:55:00Z
4
value 0.22601
scoring_system epss
scoring_elements 0.95841
published_at 2026-04-08T12:55:00Z
5
value 0.22601
scoring_system epss
scoring_elements 0.95845
published_at 2026-04-09T12:55:00Z
6
value 0.22601
scoring_system epss
scoring_elements 0.95848
published_at 2026-04-12T12:55:00Z
7
value 0.22601
scoring_system epss
scoring_elements 0.95849
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=554418
reference_id 554418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=554418
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002
reference_id 566002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002
5
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
6
reference_url https://access.redhat.com/errata/RHSA-2010:0061
reference_id RHSA-2010:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0061
7
reference_url https://usn.ubuntu.com/889-1/
reference_id USN-889-1
reference_type
scores
url https://usn.ubuntu.com/889-1/
fixed_packages
0
url pkg:deb/debian/klibc@0?distro=trixie
purl pkg:deb/debian/klibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@0%3Fdistro=trixie
1
url pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1%3Fdistro=trixie
2
url pkg:deb/debian/klibc@2.0.12-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.12-1%3Fdistro=trixie
3
url pkg:deb/debian/klibc@2.0.14-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.14-1%3Fdistro=trixie
aliases CVE-2010-0001
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vm8g-v83d-mbfm
5
url VCID-z6ae-emwm-wkb3
vulnerability_id VCID-z6ae-emwm-wkb3
summary An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31870
reference_id
reference_type
scores
0
value 0.01279
scoring_system epss
scoring_elements 0.79518
published_at 2026-04-01T12:55:00Z
1
value 0.01279
scoring_system epss
scoring_elements 0.79524
published_at 2026-04-02T12:55:00Z
2
value 0.01279
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-04T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79534
published_at 2026-04-07T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-08T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-09T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.79592
published_at 2026-04-11T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79575
published_at 2026-04-12T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.79567
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31870
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31870
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:deb/debian/klibc@2.0.8-6?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6%3Fdistro=trixie
1
url pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
purl pkg:deb/debian/klibc@2.0.8-6.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.8-6.1%3Fdistro=trixie
2
url pkg:deb/debian/klibc@2.0.12-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.12-1%3Fdistro=trixie
3
url pkg:deb/debian/klibc@2.0.14-1?distro=trixie
purl pkg:deb/debian/klibc@2.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.14-1%3Fdistro=trixie
aliases CVE-2021-31870
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6ae-emwm-wkb3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/klibc@2.0.14-1%3Fdistro=trixie