Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libiberty@20260327-1?distro=trixie
Typedeb
Namespacedebian
Namelibiberty
Version20260327-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1bz7-thv9-cyc6
vulnerability_id VCID-1bz7-thv9-cyc6
summary gcc: Invalid write due to a use-after-free to array ktypevec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4488.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4488.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4488
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62773
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62831
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62861
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62892
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62899
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62877
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62918
published_at 2026-04-16T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.62926
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333332
reference_id 1333332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333332
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161011-1?distro=trixie
purl pkg:deb/debian/libiberty@20161011-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161011-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-4488
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bz7-thv9-cyc6
1
url VCID-6cjq-sz9f-mqf9
vulnerability_id VCID-6cjq-sz9f-mqf9
summary libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3826
reference_id
reference_type
scores
0
value 0.00556
scoring_system epss
scoring_elements 0.6809
published_at 2026-04-01T12:55:00Z
1
value 0.00556
scoring_system epss
scoring_elements 0.68113
published_at 2026-04-02T12:55:00Z
2
value 0.00556
scoring_system epss
scoring_elements 0.68131
published_at 2026-04-04T12:55:00Z
3
value 0.00556
scoring_system epss
scoring_elements 0.68109
published_at 2026-04-07T12:55:00Z
4
value 0.00556
scoring_system epss
scoring_elements 0.6816
published_at 2026-04-08T12:55:00Z
5
value 0.00556
scoring_system epss
scoring_elements 0.68175
published_at 2026-04-09T12:55:00Z
6
value 0.00556
scoring_system epss
scoring_elements 0.682
published_at 2026-04-11T12:55:00Z
7
value 0.00556
scoring_system epss
scoring_elements 0.68186
published_at 2026-04-12T12:55:00Z
8
value 0.00556
scoring_system epss
scoring_elements 0.68153
published_at 2026-04-13T12:55:00Z
9
value 0.00556
scoring_system epss
scoring_elements 0.68192
published_at 2026-04-16T12:55:00Z
10
value 0.00556
scoring_system epss
scoring_elements 0.68203
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122627
reference_id 2122627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122627
5
reference_url https://access.redhat.com/errata/RHSA-2023:3269
reference_id RHSA-2023:3269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3269
6
reference_url https://access.redhat.com/errata/RHSA-2023:6372
reference_id RHSA-2023:6372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6372
fixed_packages
0
url pkg:deb/debian/libiberty@20220713-1?distro=trixie
purl pkg:deb/debian/libiberty@20220713-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20220713-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2021-3826
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cjq-sz9f-mqf9
2
url VCID-aamn-9dtp-6fg6
vulnerability_id VCID-aamn-9dtp-6fg6
summary gcc: Read access violations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4493.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4493
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63166
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63225
published_at 2026-04-02T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63255
published_at 2026-04-04T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.6322
published_at 2026-04-07T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63272
published_at 2026-04-08T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63289
published_at 2026-04-09T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-11T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.6329
published_at 2026-04-12T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63254
published_at 2026-04-13T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63291
published_at 2026-04-16T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63298
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333383
reference_id 1333383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333383
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161011-1?distro=trixie
purl pkg:deb/debian/libiberty@20161011-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161011-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-4493
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aamn-9dtp-6fg6
3
url VCID-cd45-a3xv-6uhw
vulnerability_id VCID-cd45-a3xv-6uhw
summary gcc: Read access violations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4492.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4492
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.44976
published_at 2026-04-01T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45057
published_at 2026-04-02T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45079
published_at 2026-04-04T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45021
published_at 2026-04-07T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45073
published_at 2026-04-09T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45095
published_at 2026-04-11T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45063
published_at 2026-04-12T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45065
published_at 2026-04-13T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45113
published_at 2026-04-16T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.45107
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333377
reference_id 1333377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333377
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161011-1?distro=trixie
purl pkg:deb/debian/libiberty@20161011-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161011-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-4492
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd45-a3xv-6uhw
4
url VCID-dds1-zacn-afgs
vulnerability_id VCID-dds1-zacn-afgs
summary gcc: Stack overflow due to infinite recursion in d_print_comp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4491
reference_id
reference_type
scores
0
value 0.0052
scoring_system epss
scoring_elements 0.66866
published_at 2026-04-18T12:55:00Z
1
value 0.0052
scoring_system epss
scoring_elements 0.66745
published_at 2026-04-01T12:55:00Z
2
value 0.0052
scoring_system epss
scoring_elements 0.66783
published_at 2026-04-02T12:55:00Z
3
value 0.0052
scoring_system epss
scoring_elements 0.66809
published_at 2026-04-04T12:55:00Z
4
value 0.0052
scoring_system epss
scoring_elements 0.66781
published_at 2026-04-07T12:55:00Z
5
value 0.0052
scoring_system epss
scoring_elements 0.6683
published_at 2026-04-08T12:55:00Z
6
value 0.0052
scoring_system epss
scoring_elements 0.66845
published_at 2026-04-09T12:55:00Z
7
value 0.0052
scoring_system epss
scoring_elements 0.66864
published_at 2026-04-11T12:55:00Z
8
value 0.0052
scoring_system epss
scoring_elements 0.66851
published_at 2026-04-16T12:55:00Z
9
value 0.0052
scoring_system epss
scoring_elements 0.66819
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333371
reference_id 1333371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333371
5
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
6
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
7
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20170627-1?distro=trixie
purl pkg:deb/debian/libiberty@20170627-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20170627-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-4491
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dds1-zacn-afgs
5
url VCID-juv3-bucu-efhy
vulnerability_id VCID-juv3-bucu-efhy
summary gcc: Exploitable buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2226.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2226
reference_id
reference_type
scores
0
value 0.09327
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-01T12:55:00Z
1
value 0.09327
scoring_system epss
scoring_elements 0.92736
published_at 2026-04-02T12:55:00Z
2
value 0.09327
scoring_system epss
scoring_elements 0.92742
published_at 2026-04-04T12:55:00Z
3
value 0.09327
scoring_system epss
scoring_elements 0.9274
published_at 2026-04-07T12:55:00Z
4
value 0.09327
scoring_system epss
scoring_elements 0.92749
published_at 2026-04-08T12:55:00Z
5
value 0.09327
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-09T12:55:00Z
6
value 0.09327
scoring_system epss
scoring_elements 0.92759
published_at 2026-04-11T12:55:00Z
7
value 0.09327
scoring_system epss
scoring_elements 0.92758
published_at 2026-04-13T12:55:00Z
8
value 0.09327
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2226
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333322
reference_id 1333322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333322
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
reference_id CVE-2016-2226
reference_type exploit
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42386.txt
reference_id CVE-2016-2226
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42386.txt
9
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
10
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
11
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
12
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161011-1?distro=trixie
purl pkg:deb/debian/libiberty@20161011-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161011-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-2226
risk_score 6.8
exploitability 2.0
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juv3-bucu-efhy
6
url VCID-nxer-a1h8-gfek
vulnerability_id VCID-nxer-a1h8-gfek
summary gcc: Invalid write due to integer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4489.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4489
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62773
published_at 2026-04-01T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62831
published_at 2026-04-02T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62861
published_at 2026-04-04T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-07T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.62876
published_at 2026-04-08T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62892
published_at 2026-04-09T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-11T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62899
published_at 2026-04-12T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62877
published_at 2026-04-13T12:55:00Z
9
value 0.00435
scoring_system epss
scoring_elements 0.62918
published_at 2026-04-16T12:55:00Z
10
value 0.00435
scoring_system epss
scoring_elements 0.62926
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333336
reference_id 1333336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333336
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161011-1?distro=trixie
purl pkg:deb/debian/libiberty@20161011-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161011-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-4489
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxer-a1h8-gfek
7
url VCID-sgrx-ndrs-nqdg
vulnerability_id VCID-sgrx-ndrs-nqdg
summary gcc: Invalid write due to a use-after-free to array btypevec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4487.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4487
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30969
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31094
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31141
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31015
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31044
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31051
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31007
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30962
published_at 2026-04-13T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30993
published_at 2026-04-16T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.30975
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333330
reference_id 1333330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333330
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161011-1?distro=trixie
purl pkg:deb/debian/libiberty@20161011-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161011-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-4487
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgrx-ndrs-nqdg
8
url VCID-w77d-kbu4-gud8
vulnerability_id VCID-w77d-kbu4-gud8
summary gcc,gdb,binutils,libitm: Stack overflow vulnerability in libiberty demangler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6131.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6131
reference_id
reference_type
scores
0
value 0.0176
scoring_system epss
scoring_elements 0.82537
published_at 2026-04-01T12:55:00Z
1
value 0.0176
scoring_system epss
scoring_elements 0.82639
published_at 2026-04-18T12:55:00Z
2
value 0.0176
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-13T12:55:00Z
3
value 0.0176
scoring_system epss
scoring_elements 0.82638
published_at 2026-04-16T12:55:00Z
4
value 0.0176
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-02T12:55:00Z
5
value 0.0176
scoring_system epss
scoring_elements 0.82566
published_at 2026-04-04T12:55:00Z
6
value 0.0176
scoring_system epss
scoring_elements 0.82562
published_at 2026-04-07T12:55:00Z
7
value 0.0176
scoring_system epss
scoring_elements 0.82588
published_at 2026-04-08T12:55:00Z
8
value 0.0176
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-09T12:55:00Z
9
value 0.0176
scoring_system epss
scoring_elements 0.82614
published_at 2026-04-11T12:55:00Z
10
value 0.0176
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1352068
reference_id 1352068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1352068
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840889
reference_id 840889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840889
6
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
7
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
8
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161017-1?distro=trixie
purl pkg:deb/debian/libiberty@20161017-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161017-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-6131
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w77d-kbu4-gud8
9
url VCID-xa12-b129-gkb9
vulnerability_id VCID-xa12-b129-gkb9
summary gcc: Write access violation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4490.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4490
reference_id
reference_type
scores
0
value 0.0061
scoring_system epss
scoring_elements 0.69706
published_at 2026-04-01T12:55:00Z
1
value 0.0061
scoring_system epss
scoring_elements 0.69718
published_at 2026-04-02T12:55:00Z
2
value 0.0061
scoring_system epss
scoring_elements 0.69734
published_at 2026-04-04T12:55:00Z
3
value 0.0061
scoring_system epss
scoring_elements 0.69711
published_at 2026-04-07T12:55:00Z
4
value 0.0061
scoring_system epss
scoring_elements 0.6976
published_at 2026-04-08T12:55:00Z
5
value 0.0061
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-09T12:55:00Z
6
value 0.0061
scoring_system epss
scoring_elements 0.69798
published_at 2026-04-11T12:55:00Z
7
value 0.0061
scoring_system epss
scoring_elements 0.69783
published_at 2026-04-12T12:55:00Z
8
value 0.0061
scoring_system epss
scoring_elements 0.69768
published_at 2026-04-13T12:55:00Z
9
value 0.0061
scoring_system epss
scoring_elements 0.69809
published_at 2026-04-16T12:55:00Z
10
value 0.0061
scoring_system epss
scoring_elements 0.69819
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1333366
reference_id 1333366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1333366
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
reference_id 840358
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840358
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
reference_id 840360
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840360
7
reference_url https://usn.ubuntu.com/3337-1/
reference_id USN-3337-1
reference_type
scores
url https://usn.ubuntu.com/3337-1/
8
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
9
reference_url https://usn.ubuntu.com/3368-1/
reference_id USN-3368-1
reference_type
scores
url https://usn.ubuntu.com/3368-1/
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/libiberty@20161011-1?distro=trixie
purl pkg:deb/debian/libiberty@20161011-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20161011-1%3Fdistro=trixie
1
url pkg:deb/debian/libiberty@20210106-1?distro=trixie
purl pkg:deb/debian/libiberty@20210106-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6cjq-sz9f-mqf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20210106-1%3Fdistro=trixie
2
url pkg:deb/debian/libiberty@20230104-1?distro=trixie
purl pkg:deb/debian/libiberty@20230104-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20230104-1%3Fdistro=trixie
3
url pkg:deb/debian/libiberty@20250315-1?distro=trixie
purl pkg:deb/debian/libiberty@20250315-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20250315-1%3Fdistro=trixie
4
url pkg:deb/debian/libiberty@20260327-1?distro=trixie
purl pkg:deb/debian/libiberty@20260327-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie
aliases CVE-2016-4490
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa12-b129-gkb9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libiberty@20260327-1%3Fdistro=trixie