Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libraw@0.18.11-1?distro=trixie
Typedeb
Namespacedebian
Namelibraw
Version0.18.11-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.18.13-1
Latest_non_vulnerable_version0.21.5b-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1p46-52y8-kbgb
vulnerability_id VCID-1p46-52y8-kbgb
summary libRaw: infinite loop in the parse_minolta function in dcraw/dcraw.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5813.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5813
reference_id
reference_type
scores
0
value 0.00455
scoring_system epss
scoring_elements 0.6377
published_at 2026-04-01T12:55:00Z
1
value 0.00455
scoring_system epss
scoring_elements 0.63832
published_at 2026-04-02T12:55:00Z
2
value 0.00455
scoring_system epss
scoring_elements 0.63858
published_at 2026-04-04T12:55:00Z
3
value 0.00455
scoring_system epss
scoring_elements 0.63816
published_at 2026-04-07T12:55:00Z
4
value 0.00455
scoring_system epss
scoring_elements 0.63867
published_at 2026-04-08T12:55:00Z
5
value 0.00455
scoring_system epss
scoring_elements 0.63884
published_at 2026-04-09T12:55:00Z
6
value 0.00455
scoring_system epss
scoring_elements 0.63897
published_at 2026-04-11T12:55:00Z
7
value 0.00455
scoring_system epss
scoring_elements 0.63883
published_at 2026-04-12T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64028
published_at 2026-04-18T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.6398
published_at 2026-04-13T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.64016
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5813
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609954
reference_id 1609954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609954
5
reference_url https://usn.ubuntu.com/3838-1/
reference_id USN-3838-1
reference_type
scores
url https://usn.ubuntu.com/3838-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-5813
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1p46-52y8-kbgb
1
url VCID-cm22-ayty-xqes
vulnerability_id VCID-cm22-ayty-xqes
summary LibRaw: stack-based buffer overflow in LibRaw::parse_exif() and subsequently execute arbitrary code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5809.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5809
reference_id
reference_type
scores
0
value 0.01917
scoring_system epss
scoring_elements 0.83256
published_at 2026-04-01T12:55:00Z
1
value 0.01917
scoring_system epss
scoring_elements 0.83272
published_at 2026-04-02T12:55:00Z
2
value 0.01917
scoring_system epss
scoring_elements 0.83287
published_at 2026-04-04T12:55:00Z
3
value 0.01917
scoring_system epss
scoring_elements 0.83286
published_at 2026-04-07T12:55:00Z
4
value 0.01917
scoring_system epss
scoring_elements 0.8331
published_at 2026-04-08T12:55:00Z
5
value 0.01917
scoring_system epss
scoring_elements 0.83319
published_at 2026-04-09T12:55:00Z
6
value 0.01917
scoring_system epss
scoring_elements 0.83335
published_at 2026-04-11T12:55:00Z
7
value 0.01917
scoring_system epss
scoring_elements 0.83329
published_at 2026-04-12T12:55:00Z
8
value 0.01917
scoring_system epss
scoring_elements 0.83325
published_at 2026-04-13T12:55:00Z
9
value 0.01917
scoring_system epss
scoring_elements 0.8336
published_at 2026-04-16T12:55:00Z
10
value 0.01917
scoring_system epss
scoring_elements 0.83361
published_at 2026-04-18T12:55:00Z
11
value 0.01917
scoring_system epss
scoring_elements 0.83362
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5809
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661520
reference_id 1661520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661520
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-5809
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cm22-ayty-xqes
2
url VCID-feqd-qmgg-kyer
vulnerability_id VCID-feqd-qmgg-kyer
summary libRaw: NULL pointer dereference in nikon_coolscan_load_raw in internal/dcraw_common.cpp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5812.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5812
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.6624
published_at 2026-04-01T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.6628
published_at 2026-04-02T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66306
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66276
published_at 2026-04-07T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66324
published_at 2026-04-08T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66337
published_at 2026-04-09T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66357
published_at 2026-04-11T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66344
published_at 2026-04-12T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66314
published_at 2026-04-13T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66349
published_at 2026-04-16T12:55:00Z
10
value 0.00508
scoring_system epss
scoring_elements 0.66365
published_at 2026-04-18T12:55:00Z
11
value 0.00508
scoring_system epss
scoring_elements 0.6635
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5812
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610486
reference_id 1610486
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610486
4
reference_url https://usn.ubuntu.com/3838-1/
reference_id USN-3838-1
reference_type
scores
url https://usn.ubuntu.com/3838-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-5812
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-feqd-qmgg-kyer
3
url VCID-gfwy-pxzr-gqa6
vulnerability_id VCID-gfwy-pxzr-gqa6
summary LibRaw: out-of-bounds read in nikon_coolscan_load_raw in internal/dcraw_common.cpp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5811.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5811
reference_id
reference_type
scores
0
value 0.00507
scoring_system epss
scoring_elements 0.6617
published_at 2026-04-01T12:55:00Z
1
value 0.00507
scoring_system epss
scoring_elements 0.66211
published_at 2026-04-02T12:55:00Z
2
value 0.00507
scoring_system epss
scoring_elements 0.66238
published_at 2026-04-04T12:55:00Z
3
value 0.00507
scoring_system epss
scoring_elements 0.66208
published_at 2026-04-07T12:55:00Z
4
value 0.00507
scoring_system epss
scoring_elements 0.66255
published_at 2026-04-08T12:55:00Z
5
value 0.00507
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-09T12:55:00Z
6
value 0.00507
scoring_system epss
scoring_elements 0.66289
published_at 2026-04-11T12:55:00Z
7
value 0.00507
scoring_system epss
scoring_elements 0.66275
published_at 2026-04-12T12:55:00Z
8
value 0.00507
scoring_system epss
scoring_elements 0.66244
published_at 2026-04-13T12:55:00Z
9
value 0.00507
scoring_system epss
scoring_elements 0.66279
published_at 2026-04-16T12:55:00Z
10
value 0.00507
scoring_system epss
scoring_elements 0.66294
published_at 2026-04-18T12:55:00Z
11
value 0.00507
scoring_system epss
scoring_elements 0.66278
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5811
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5811
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610483
reference_id 1610483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610483
4
reference_url https://usn.ubuntu.com/3838-1/
reference_id USN-3838-1
reference_type
scores
url https://usn.ubuntu.com/3838-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-5811
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfwy-pxzr-gqa6
4
url VCID-h8wv-qjp1-abe5
vulnerability_id VCID-h8wv-qjp1-abe5
summary LibRaw: out-of-bounds read in samsung_load_raw in internal/dcraw_common.cpp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5807.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5807
reference_id
reference_type
scores
0
value 0.00481
scoring_system epss
scoring_elements 0.65024
published_at 2026-04-01T12:55:00Z
1
value 0.00481
scoring_system epss
scoring_elements 0.65075
published_at 2026-04-02T12:55:00Z
2
value 0.00481
scoring_system epss
scoring_elements 0.65101
published_at 2026-04-04T12:55:00Z
3
value 0.00481
scoring_system epss
scoring_elements 0.65065
published_at 2026-04-07T12:55:00Z
4
value 0.00481
scoring_system epss
scoring_elements 0.65113
published_at 2026-04-08T12:55:00Z
5
value 0.00481
scoring_system epss
scoring_elements 0.65127
published_at 2026-04-09T12:55:00Z
6
value 0.00481
scoring_system epss
scoring_elements 0.65146
published_at 2026-04-11T12:55:00Z
7
value 0.00481
scoring_system epss
scoring_elements 0.65136
published_at 2026-04-12T12:55:00Z
8
value 0.00481
scoring_system epss
scoring_elements 0.65108
published_at 2026-04-13T12:55:00Z
9
value 0.00481
scoring_system epss
scoring_elements 0.65145
published_at 2026-04-16T12:55:00Z
10
value 0.00481
scoring_system epss
scoring_elements 0.65154
published_at 2026-04-18T12:55:00Z
11
value 0.00481
scoring_system epss
scoring_elements 0.65138
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5807
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610469
reference_id 1610469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610469
5
reference_url https://usn.ubuntu.com/3838-1/
reference_id USN-3838-1
reference_type
scores
url https://usn.ubuntu.com/3838-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-5807
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h8wv-qjp1-abe5
5
url VCID-hsza-kpb5-vqb9
vulnerability_id VCID-hsza-kpb5-vqb9
summary LibRaw: Stack-based buffer overflow in libraw_cxx.cpp:utf2char() allows for potential code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10528.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10528
reference_id
reference_type
scores
0
value 0.0194
scoring_system epss
scoring_elements 0.83356
published_at 2026-04-01T12:55:00Z
1
value 0.0194
scoring_system epss
scoring_elements 0.83459
published_at 2026-04-21T12:55:00Z
2
value 0.0194
scoring_system epss
scoring_elements 0.83427
published_at 2026-04-12T12:55:00Z
3
value 0.0194
scoring_system epss
scoring_elements 0.83422
published_at 2026-04-13T12:55:00Z
4
value 0.0194
scoring_system epss
scoring_elements 0.83458
published_at 2026-04-16T12:55:00Z
5
value 0.0194
scoring_system epss
scoring_elements 0.83369
published_at 2026-04-02T12:55:00Z
6
value 0.0194
scoring_system epss
scoring_elements 0.83384
published_at 2026-04-07T12:55:00Z
7
value 0.0194
scoring_system epss
scoring_elements 0.83408
published_at 2026-04-08T12:55:00Z
8
value 0.0194
scoring_system epss
scoring_elements 0.83418
published_at 2026-04-09T12:55:00Z
9
value 0.0194
scoring_system epss
scoring_elements 0.83432
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10528
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10528
3
reference_url https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3
reference_id
reference_type
scores
url https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3
4
reference_url https://github.com/LibRaw/LibRaw/issues/144
reference_id
reference_type
scores
url https://github.com/LibRaw/LibRaw/issues/144
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1574313
reference_id 1574313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1574313
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897185
reference_id 897185
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897185
7
reference_url https://security.archlinux.org/ASA-201805-2
reference_id ASA-201805-2
reference_type
scores
url https://security.archlinux.org/ASA-201805-2
8
reference_url https://security.archlinux.org/AVG-681
reference_id AVG-681
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-681
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10528
reference_id CVE-2018-10528
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10528
14
reference_url https://usn.ubuntu.com/3639-1/
reference_id USN-3639-1
reference_type
scores
url https://usn.ubuntu.com/3639-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-10528
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsza-kpb5-vqb9
6
url VCID-m4v4-63we-dqex
vulnerability_id VCID-m4v4-63we-dqex
summary LibRaw: Out-of-bounds read in X3F property table list functionality in libraw_x3f.cpp and libraw_cxx.cpp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10529.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10529
reference_id
reference_type
scores
0
value 0.00406
scoring_system epss
scoring_elements 0.60973
published_at 2026-04-01T12:55:00Z
1
value 0.00406
scoring_system epss
scoring_elements 0.61127
published_at 2026-04-21T12:55:00Z
2
value 0.00406
scoring_system epss
scoring_elements 0.61098
published_at 2026-04-13T12:55:00Z
3
value 0.00406
scoring_system epss
scoring_elements 0.61139
published_at 2026-04-16T12:55:00Z
4
value 0.00406
scoring_system epss
scoring_elements 0.61145
published_at 2026-04-18T12:55:00Z
5
value 0.00406
scoring_system epss
scoring_elements 0.61051
published_at 2026-04-02T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.61079
published_at 2026-04-04T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61045
published_at 2026-04-07T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61093
published_at 2026-04-08T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.61109
published_at 2026-04-09T12:55:00Z
10
value 0.00406
scoring_system epss
scoring_elements 0.6113
published_at 2026-04-11T12:55:00Z
11
value 0.00406
scoring_system epss
scoring_elements 0.61116
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10529
3
reference_url https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c
reference_id
reference_type
scores
url https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c
4
reference_url https://github.com/LibRaw/LibRaw/issues/144
reference_id
reference_type
scores
url https://github.com/LibRaw/LibRaw/issues/144
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1574325
reference_id 1574325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1574325
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897186
reference_id 897186
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897186
7
reference_url https://security.archlinux.org/ASA-201805-2
reference_id ASA-201805-2
reference_type
scores
url https://security.archlinux.org/ASA-201805-2
8
reference_url https://security.archlinux.org/AVG-681
reference_id AVG-681
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-681
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10529
reference_id CVE-2018-10529
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10529
14
reference_url https://usn.ubuntu.com/3639-1/
reference_id USN-3639-1
reference_type
scores
url https://usn.ubuntu.com/3639-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-10529
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4v4-63we-dqex
7
url VCID-n8g7-9k7s-17g3
vulnerability_id VCID-n8g7-9k7s-17g3
summary LibRaw: stack-based buffer overflow in find_green() leads to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5808.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5808
reference_id
reference_type
scores
0
value 0.02316
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-01T12:55:00Z
1
value 0.02316
scoring_system epss
scoring_elements 0.84727
published_at 2026-04-02T12:55:00Z
2
value 0.02316
scoring_system epss
scoring_elements 0.84746
published_at 2026-04-04T12:55:00Z
3
value 0.02316
scoring_system epss
scoring_elements 0.84748
published_at 2026-04-07T12:55:00Z
4
value 0.02316
scoring_system epss
scoring_elements 0.8477
published_at 2026-04-08T12:55:00Z
5
value 0.02316
scoring_system epss
scoring_elements 0.84777
published_at 2026-04-09T12:55:00Z
6
value 0.02316
scoring_system epss
scoring_elements 0.84795
published_at 2026-04-11T12:55:00Z
7
value 0.02316
scoring_system epss
scoring_elements 0.84791
published_at 2026-04-12T12:55:00Z
8
value 0.02316
scoring_system epss
scoring_elements 0.84785
published_at 2026-04-13T12:55:00Z
9
value 0.02316
scoring_system epss
scoring_elements 0.84807
published_at 2026-04-16T12:55:00Z
10
value 0.02316
scoring_system epss
scoring_elements 0.84808
published_at 2026-04-18T12:55:00Z
11
value 0.02316
scoring_system epss
scoring_elements 0.84805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5808
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661518
reference_id 1661518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661518
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-5808
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n8g7-9k7s-17g3
8
url VCID-v4se-wza6-a3dt
vulnerability_id VCID-v4se-wza6-a3dt
summary libRaw: heap-based buffer overflow in rollei_load_raw in internal/dcraw_common.cpp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5810.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5810
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.65977
published_at 2026-04-01T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-02T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66047
published_at 2026-04-04T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.66015
published_at 2026-04-07T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.66064
published_at 2026-04-08T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66077
published_at 2026-04-09T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66096
published_at 2026-04-11T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66083
published_at 2026-04-12T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66053
published_at 2026-04-13T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66088
published_at 2026-04-16T12:55:00Z
10
value 0.00502
scoring_system epss
scoring_elements 0.66102
published_at 2026-04-18T12:55:00Z
11
value 0.00502
scoring_system epss
scoring_elements 0.6609
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5810
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610479
reference_id 1610479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610479
5
reference_url https://usn.ubuntu.com/3838-1/
reference_id USN-3838-1
reference_type
scores
url https://usn.ubuntu.com/3838-1/
fixed_packages
0
url pkg:deb/debian/libraw@0.18.11-1?distro=trixie
purl pkg:deb/debian/libraw@0.18.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie
1
url pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libraw@0.20.2-2.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.20.2-2.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libraw@0.21.4-2?distro=trixie
purl pkg:deb/debian/libraw@0.21.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.4-2%3Fdistro=trixie
4
url pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
purl pkg:deb/debian/libraw@0.21.5b-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.21.5b-1%3Fdistro=trixie
aliases CVE-2018-5810
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4se-wza6-a3dt
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libraw@0.18.11-1%3Fdistro=trixie