Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wznk-5ze9-kucq
Summary
Multiple vulnerabilities in Python may allow for the execution of arbitrary
    code.
Aliases
0
alias CVE-2008-2315
Fixed_packages
0
url pkg:ebuild/dev-lang/python@2.5.2-r6
purl pkg:ebuild/dev-lang/python@2.5.2-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/python@2.5.2-r6
Affected_packages
0
url pkg:rpm/redhat/python@2.2.3-6?arch=11
purl pkg:rpm/redhat/python@2.2.3-6?arch=11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24m5-6chr-y7a8
1
vulnerability VCID-38yx-1h5j-4kb1
2
vulnerability VCID-bas7-hr7c-r7b3
3
vulnerability VCID-fpye-8fe9-m7du
4
vulnerability VCID-g65j-xhje-hkd4
5
vulnerability VCID-qh23-73q6-pubf
6
vulnerability VCID-wznk-5ze9-kucq
7
vulnerability VCID-yser-kjy9-e7ck
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.2.3-6%3Farch=11
1
url pkg:rpm/redhat/python@2.3.4-14.7.el4_8?arch=2
purl pkg:rpm/redhat/python@2.3.4-14.7.el4_8?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24m5-6chr-y7a8
1
vulnerability VCID-38yx-1h5j-4kb1
2
vulnerability VCID-b3m1-mjke-n3br
3
vulnerability VCID-bas7-hr7c-r7b3
4
vulnerability VCID-fpye-8fe9-m7du
5
vulnerability VCID-g65j-xhje-hkd4
6
vulnerability VCID-qh23-73q6-pubf
7
vulnerability VCID-wznk-5ze9-kucq
8
vulnerability VCID-yser-kjy9-e7ck
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.3.4-14.7.el4_8%3Farch=2
2
url pkg:rpm/redhat/python@2.4.3-24.el5_3?arch=6
purl pkg:rpm/redhat/python@2.4.3-24.el5_3?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24m5-6chr-y7a8
1
vulnerability VCID-38yx-1h5j-4kb1
2
vulnerability VCID-b3m1-mjke-n3br
3
vulnerability VCID-bas7-hr7c-r7b3
4
vulnerability VCID-fpye-8fe9-m7du
5
vulnerability VCID-g65j-xhje-hkd4
6
vulnerability VCID-k8aa-5wqq-73h3
7
vulnerability VCID-q7b1-n4tc-dffa
8
vulnerability VCID-qh23-73q6-pubf
9
vulnerability VCID-wznk-5ze9-kucq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.4.3-24.el5_3%3Farch=6
References
0
reference_url http://bugs.gentoo.org/attachment.cgi?id=159418&action=view
reference_id
reference_type
scores
url http://bugs.gentoo.org/attachment.cgi?id=159418&action=view
1
reference_url http://bugs.gentoo.org/show_bug.cgi?id=230640
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=230640
2
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2315.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2315.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2315
reference_id
reference_type
scores
0
value 0.00925
scoring_system epss
scoring_elements 0.76102
published_at 2026-04-29T12:55:00Z
1
value 0.00925
scoring_system epss
scoring_elements 0.75955
published_at 2026-04-01T12:55:00Z
2
value 0.00925
scoring_system epss
scoring_elements 0.75959
published_at 2026-04-02T12:55:00Z
3
value 0.00925
scoring_system epss
scoring_elements 0.75991
published_at 2026-04-04T12:55:00Z
4
value 0.00925
scoring_system epss
scoring_elements 0.75971
published_at 2026-04-07T12:55:00Z
5
value 0.00925
scoring_system epss
scoring_elements 0.76003
published_at 2026-04-08T12:55:00Z
6
value 0.00925
scoring_system epss
scoring_elements 0.76018
published_at 2026-04-09T12:55:00Z
7
value 0.00925
scoring_system epss
scoring_elements 0.76043
published_at 2026-04-11T12:55:00Z
8
value 0.00925
scoring_system epss
scoring_elements 0.7602
published_at 2026-04-12T12:55:00Z
9
value 0.00925
scoring_system epss
scoring_elements 0.76015
published_at 2026-04-13T12:55:00Z
10
value 0.00925
scoring_system epss
scoring_elements 0.76055
published_at 2026-04-16T12:55:00Z
11
value 0.00925
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-18T12:55:00Z
12
value 0.00925
scoring_system epss
scoring_elements 0.76042
published_at 2026-04-21T12:55:00Z
13
value 0.00925
scoring_system epss
scoring_elements 0.76081
published_at 2026-04-24T12:55:00Z
14
value 0.00925
scoring_system epss
scoring_elements 0.76091
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2315
6
reference_url http://secunia.com/advisories/31305
reference_id
reference_type
scores
url http://secunia.com/advisories/31305
7
reference_url http://secunia.com/advisories/31332
reference_id
reference_type
scores
url http://secunia.com/advisories/31332
8
reference_url http://secunia.com/advisories/31358
reference_id
reference_type
scores
url http://secunia.com/advisories/31358
9
reference_url http://secunia.com/advisories/31365
reference_id
reference_type
scores
url http://secunia.com/advisories/31365
10
reference_url http://secunia.com/advisories/31518
reference_id
reference_type
scores
url http://secunia.com/advisories/31518
11
reference_url http://secunia.com/advisories/31687
reference_id
reference_type
scores
url http://secunia.com/advisories/31687
12
reference_url http://secunia.com/advisories/32793
reference_id
reference_type
scores
url http://secunia.com/advisories/32793
13
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
14
reference_url http://secunia.com/advisories/37471
reference_id
reference_type
scores
url http://secunia.com/advisories/37471
15
reference_url http://secunia.com/advisories/38675
reference_id
reference_type
scores
url http://secunia.com/advisories/38675
16
reference_url http://security.gentoo.org/glsa/glsa-200807-16.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-16.xml
17
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44172
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44172
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44173
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44173
19
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8445
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8445
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8683
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8683
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9761
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9761
23
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
24
reference_url http://support.avaya.com/css/P8/documents/100074697
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100074697
25
reference_url http://www.debian.org/security/2008/dsa-1667
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1667
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:163
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:163
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:164
28
reference_url http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900
reference_id
reference_type
scores
url http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900
29
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/2
30
reference_url http://www.openwall.com/lists/oss-security/2008/11/05/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/05/3
31
reference_url http://www.securityfocus.com/archive/1/507985/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/507985/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/30491
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30491
33
reference_url http://www.ubuntu.com/usn/usn-632-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-632-1
34
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0016.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0016.html
35
reference_url http://www.vupen.com/english/advisories/2008/2288
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2288
36
reference_url http://www.vupen.com/english/advisories/2009/3316
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/3316
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=455008
reference_id 455008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=455008
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2315
reference_id CVE-2008-2315
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2315
40
reference_url https://security.gentoo.org/glsa/200807-16
reference_id GLSA-200807-16
reference_type
scores
url https://security.gentoo.org/glsa/200807-16
41
reference_url https://access.redhat.com/errata/RHSA-2009:1176
reference_id RHSA-2009:1176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1176
42
reference_url https://access.redhat.com/errata/RHSA-2009:1177
reference_id RHSA-2009:1177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1177
43
reference_url https://access.redhat.com/errata/RHSA-2009:1178
reference_id RHSA-2009:1178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1178
44
reference_url https://usn.ubuntu.com/632-1/
reference_id USN-632-1
reference_type
scores
url https://usn.ubuntu.com/632-1/
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score7.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wznk-5ze9-kucq