Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
Typedeb
Namespacedebian
Namexmlrpc-c
Version1.59.03-10
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.60.05-1
Latest_non_vulnerable_version1.60.05-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4zzy-q5zp-jkgm
vulnerability_id VCID-4zzy-q5zp-jkgm
summary A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3720.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3720
reference_id
reference_type
scores
0
value 0.01541
scoring_system epss
scoring_elements 0.81381
published_at 2026-04-12T12:55:00Z
1
value 0.01541
scoring_system epss
scoring_elements 0.8131
published_at 2026-04-01T12:55:00Z
2
value 0.01541
scoring_system epss
scoring_elements 0.81319
published_at 2026-04-02T12:55:00Z
3
value 0.01541
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-04T12:55:00Z
4
value 0.01541
scoring_system epss
scoring_elements 0.81339
published_at 2026-04-07T12:55:00Z
5
value 0.01541
scoring_system epss
scoring_elements 0.81368
published_at 2026-04-08T12:55:00Z
6
value 0.01541
scoring_system epss
scoring_elements 0.81373
published_at 2026-04-13T12:55:00Z
7
value 0.01541
scoring_system epss
scoring_elements 0.81394
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=531697
reference_id 531697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=531697
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551936
reference_id 551936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551936
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
reference_id 560919
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
reference_id 560920
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
reference_id 560921
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
reference_id 560922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
reference_id 560926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
reference_id 560927
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
reference_id 560928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
reference_id 560929
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
reference_id 560930
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
reference_id 560935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
reference_id 560936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
reference_id 560937
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
reference_id 560940
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
reference_id 560942
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560950
reference_id 560950
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560950
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
reference_id 601053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
21
reference_url https://httpd.apache.org/security/json/CVE-2009-3720.json
reference_id CVE-2009-3720
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-3720.json
22
reference_url https://security.gentoo.org/glsa/201209-06
reference_id GLSA-201209-06
reference_type
scores
url https://security.gentoo.org/glsa/201209-06
23
reference_url https://access.redhat.com/errata/RHSA-2009:1572
reference_id RHSA-2009:1572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1572
24
reference_url https://access.redhat.com/errata/RHSA-2009:1625
reference_id RHSA-2009:1625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1625
25
reference_url https://access.redhat.com/errata/RHSA-2010:0002
reference_id RHSA-2010:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0002
26
reference_url https://access.redhat.com/errata/RHSA-2011:0491
reference_id RHSA-2011:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0491
27
reference_url https://access.redhat.com/errata/RHSA-2011:0492
reference_id RHSA-2011:0492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0492
28
reference_url https://access.redhat.com/errata/RHSA-2017:3239
reference_id RHSA-2017:3239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3239
29
reference_url https://usn.ubuntu.com/890-1/
reference_id USN-890-1
reference_type
scores
url https://usn.ubuntu.com/890-1/
30
reference_url https://usn.ubuntu.com/890-2/
reference_id USN-890-2
reference_type
scores
url https://usn.ubuntu.com/890-2/
31
reference_url https://usn.ubuntu.com/890-3/
reference_id USN-890-3
reference_type
scores
url https://usn.ubuntu.com/890-3/
32
reference_url https://usn.ubuntu.com/890-4/
reference_id USN-890-4
reference_type
scores
url https://usn.ubuntu.com/890-4/
33
reference_url https://usn.ubuntu.com/890-5/
reference_id USN-890-5
reference_type
scores
url https://usn.ubuntu.com/890-5/
34
reference_url https://usn.ubuntu.com/890-6/
reference_id USN-890-6
reference_type
scores
url https://usn.ubuntu.com/890-6/
fixed_packages
0
url pkg:deb/debian/xmlrpc-c@1.06.27-1.1?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.06.27-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.06.27-1.1%3Fdistro=trixie
1
url pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-9%3Fdistro=trixie
2
url pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-11%3Fdistro=trixie
3
url pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.59.03-10%3Fdistro=trixie
4
url pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.60.05-1%3Fdistro=trixie
aliases CVE-2009-3720
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zzy-q5zp-jkgm
1
url VCID-e742-j1bw-jbbh
vulnerability_id VCID-e742-j1bw-jbbh
summary
Multiple vulnerabilities have been found in Expat, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1148.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1148
reference_id
reference_type
scores
0
value 0.01289
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-01T12:55:00Z
1
value 0.01289
scoring_system epss
scoring_elements 0.79603
published_at 2026-04-02T12:55:00Z
2
value 0.01289
scoring_system epss
scoring_elements 0.79626
published_at 2026-04-04T12:55:00Z
3
value 0.01317
scoring_system epss
scoring_elements 0.79821
published_at 2026-04-07T12:55:00Z
4
value 0.01317
scoring_system epss
scoring_elements 0.7985
published_at 2026-04-08T12:55:00Z
5
value 0.01317
scoring_system epss
scoring_elements 0.79858
published_at 2026-04-09T12:55:00Z
6
value 0.01317
scoring_system epss
scoring_elements 0.7988
published_at 2026-04-11T12:55:00Z
7
value 0.01317
scoring_system epss
scoring_elements 0.79863
published_at 2026-04-12T12:55:00Z
8
value 0.01317
scoring_system epss
scoring_elements 0.79855
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1148
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663579
reference_id 663579
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663579
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687672
reference_id 687672
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687672
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=801648
reference_id 801648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=801648
6
reference_url https://security.gentoo.org/glsa/201209-06
reference_id GLSA-201209-06
reference_type
scores
url https://security.gentoo.org/glsa/201209-06
7
reference_url https://access.redhat.com/errata/RHSA-2012:0731
reference_id RHSA-2012:0731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0731
8
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
9
reference_url https://usn.ubuntu.com/1527-1/
reference_id USN-1527-1
reference_type
scores
url https://usn.ubuntu.com/1527-1/
10
reference_url https://usn.ubuntu.com/1527-2/
reference_id USN-1527-2
reference_type
scores
url https://usn.ubuntu.com/1527-2/
11
reference_url https://usn.ubuntu.com/1613-1/
reference_id USN-1613-1
reference_type
scores
url https://usn.ubuntu.com/1613-1/
12
reference_url https://usn.ubuntu.com/1613-2/
reference_id USN-1613-2
reference_type
scores
url https://usn.ubuntu.com/1613-2/
13
reference_url https://usn.ubuntu.com/7307-1/
reference_id USN-7307-1
reference_type
scores
url https://usn.ubuntu.com/7307-1/
14
reference_url https://usn.ubuntu.com/USN-5455-1/
reference_id USN-USN-5455-1
reference_type
scores
url https://usn.ubuntu.com/USN-5455-1/
fixed_packages
0
url pkg:deb/debian/xmlrpc-c@1.16.33-3.2?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.16.33-3.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.16.33-3.2%3Fdistro=trixie
1
url pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-9%3Fdistro=trixie
2
url pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-11%3Fdistro=trixie
3
url pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.59.03-10%3Fdistro=trixie
4
url pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.60.05-1%3Fdistro=trixie
aliases CVE-2012-1148
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e742-j1bw-jbbh
2
url VCID-qtav-hqnd-b7fa
vulnerability_id VCID-qtav-hqnd-b7fa
summary A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3560.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3560.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3560
reference_id
reference_type
scores
0
value 0.0283
scoring_system epss
scoring_elements 0.86182
published_at 2026-04-11T12:55:00Z
1
value 0.0283
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-01T12:55:00Z
2
value 0.0283
scoring_system epss
scoring_elements 0.86121
published_at 2026-04-02T12:55:00Z
3
value 0.0283
scoring_system epss
scoring_elements 0.86137
published_at 2026-04-07T12:55:00Z
4
value 0.0283
scoring_system epss
scoring_elements 0.86156
published_at 2026-04-08T12:55:00Z
5
value 0.0283
scoring_system epss
scoring_elements 0.86168
published_at 2026-04-09T12:55:00Z
6
value 0.03311
scoring_system epss
scoring_elements 0.87253
published_at 2026-04-13T12:55:00Z
7
value 0.03311
scoring_system epss
scoring_elements 0.87257
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3560
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=533174
reference_id 533174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=533174
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560901
reference_id 560901
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560901
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
reference_id 560919
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
reference_id 560920
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
reference_id 560921
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
reference_id 560922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
reference_id 560926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
reference_id 560927
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
reference_id 560928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
reference_id 560929
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
reference_id 560930
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
reference_id 560935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
reference_id 560936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
reference_id 560937
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
reference_id 560940
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
reference_id 560942
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
reference_id 601053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
20
reference_url https://httpd.apache.org/security/json/CVE-2009-3560.json
reference_id CVE-2009-3560
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-3560.json
21
reference_url https://security.gentoo.org/glsa/201209-06
reference_id GLSA-201209-06
reference_type
scores
url https://security.gentoo.org/glsa/201209-06
22
reference_url https://access.redhat.com/errata/RHSA-2009:1625
reference_id RHSA-2009:1625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1625
23
reference_url https://access.redhat.com/errata/RHSA-2017:3239
reference_id RHSA-2017:3239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3239
24
reference_url https://usn.ubuntu.com/890-1/
reference_id USN-890-1
reference_type
scores
url https://usn.ubuntu.com/890-1/
25
reference_url https://usn.ubuntu.com/890-2/
reference_id USN-890-2
reference_type
scores
url https://usn.ubuntu.com/890-2/
26
reference_url https://usn.ubuntu.com/890-3/
reference_id USN-890-3
reference_type
scores
url https://usn.ubuntu.com/890-3/
27
reference_url https://usn.ubuntu.com/890-4/
reference_id USN-890-4
reference_type
scores
url https://usn.ubuntu.com/890-4/
28
reference_url https://usn.ubuntu.com/890-5/
reference_id USN-890-5
reference_type
scores
url https://usn.ubuntu.com/890-5/
29
reference_url https://usn.ubuntu.com/890-6/
reference_id USN-890-6
reference_type
scores
url https://usn.ubuntu.com/890-6/
fixed_packages
0
url pkg:deb/debian/xmlrpc-c@1.06.27-1.1?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.06.27-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.06.27-1.1%3Fdistro=trixie
1
url pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-9%3Fdistro=trixie
2
url pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-11%3Fdistro=trixie
3
url pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.59.03-10%3Fdistro=trixie
4
url pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.60.05-1%3Fdistro=trixie
aliases CVE-2009-3560
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtav-hqnd-b7fa
3
url VCID-ra3j-95vv-cfen
vulnerability_id VCID-ra3j-95vv-cfen
summary
Multiple vulnerabilities have been found in Expat, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0876.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0876
reference_id
reference_type
scores
0
value 0.00306
scoring_system epss
scoring_elements 0.53862
published_at 2026-04-13T12:55:00Z
1
value 0.00306
scoring_system epss
scoring_elements 0.53778
published_at 2026-04-01T12:55:00Z
2
value 0.00306
scoring_system epss
scoring_elements 0.53797
published_at 2026-04-07T12:55:00Z
3
value 0.00306
scoring_system epss
scoring_elements 0.53824
published_at 2026-04-04T12:55:00Z
4
value 0.00306
scoring_system epss
scoring_elements 0.53849
published_at 2026-04-08T12:55:00Z
5
value 0.00306
scoring_system epss
scoring_elements 0.53847
published_at 2026-04-09T12:55:00Z
6
value 0.00306
scoring_system epss
scoring_elements 0.53895
published_at 2026-04-11T12:55:00Z
7
value 0.00306
scoring_system epss
scoring_elements 0.53878
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0876
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663579
reference_id 663579
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663579
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687672
reference_id 687672
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687672
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=786617
reference_id 786617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=786617
7
reference_url https://security.gentoo.org/glsa/201209-06
reference_id GLSA-201209-06
reference_type
scores
url https://security.gentoo.org/glsa/201209-06
8
reference_url https://access.redhat.com/errata/RHSA-2012:0731
reference_id RHSA-2012:0731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0731
9
reference_url https://access.redhat.com/errata/RHSA-2016:0062
reference_id RHSA-2016:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0062
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://access.redhat.com/errata/RHSA-2017:3239
reference_id RHSA-2017:3239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3239
12
reference_url https://usn.ubuntu.com/1527-1/
reference_id USN-1527-1
reference_type
scores
url https://usn.ubuntu.com/1527-1/
13
reference_url https://usn.ubuntu.com/1527-2/
reference_id USN-1527-2
reference_type
scores
url https://usn.ubuntu.com/1527-2/
14
reference_url https://usn.ubuntu.com/1613-1/
reference_id USN-1613-1
reference_type
scores
url https://usn.ubuntu.com/1613-1/
15
reference_url https://usn.ubuntu.com/1613-2/
reference_id USN-1613-2
reference_type
scores
url https://usn.ubuntu.com/1613-2/
fixed_packages
0
url pkg:deb/debian/xmlrpc-c@1.16.33-3.2?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.16.33-3.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.16.33-3.2%3Fdistro=trixie
1
url pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-9%3Fdistro=trixie
2
url pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.33.14-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.33.14-11%3Fdistro=trixie
3
url pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.59.03-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.59.03-10%3Fdistro=trixie
4
url pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
purl pkg:deb/debian/xmlrpc-c@1.60.05-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.60.05-1%3Fdistro=trixie
aliases CVE-2012-0876
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ra3j-95vv-cfen
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xmlrpc-c@1.59.03-10%3Fdistro=trixie