Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-g65j-xhje-hkd4
Summary
Multiple vulnerabilities in Python may allow for the execution of arbitrary
    code.
Aliases
0
alias CVE-2008-3142
Fixed_packages
0
url pkg:ebuild/dev-lang/python@2.5.2-r6
purl pkg:ebuild/dev-lang/python@2.5.2-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/python@2.5.2-r6
Affected_packages
0
url pkg:rpm/redhat/python@2.2.3-6?arch=11
purl pkg:rpm/redhat/python@2.2.3-6?arch=11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24m5-6chr-y7a8
1
vulnerability VCID-38yx-1h5j-4kb1
2
vulnerability VCID-bas7-hr7c-r7b3
3
vulnerability VCID-fpye-8fe9-m7du
4
vulnerability VCID-g65j-xhje-hkd4
5
vulnerability VCID-qh23-73q6-pubf
6
vulnerability VCID-wznk-5ze9-kucq
7
vulnerability VCID-yser-kjy9-e7ck
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.2.3-6%3Farch=11
1
url pkg:rpm/redhat/python@2.3.4-14.7.el4_8?arch=2
purl pkg:rpm/redhat/python@2.3.4-14.7.el4_8?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24m5-6chr-y7a8
1
vulnerability VCID-38yx-1h5j-4kb1
2
vulnerability VCID-b3m1-mjke-n3br
3
vulnerability VCID-bas7-hr7c-r7b3
4
vulnerability VCID-fpye-8fe9-m7du
5
vulnerability VCID-g65j-xhje-hkd4
6
vulnerability VCID-qh23-73q6-pubf
7
vulnerability VCID-wznk-5ze9-kucq
8
vulnerability VCID-yser-kjy9-e7ck
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.3.4-14.7.el4_8%3Farch=2
2
url pkg:rpm/redhat/python@2.4.3-24.el5_3?arch=6
purl pkg:rpm/redhat/python@2.4.3-24.el5_3?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24m5-6chr-y7a8
1
vulnerability VCID-38yx-1h5j-4kb1
2
vulnerability VCID-b3m1-mjke-n3br
3
vulnerability VCID-bas7-hr7c-r7b3
4
vulnerability VCID-fpye-8fe9-m7du
5
vulnerability VCID-g65j-xhje-hkd4
6
vulnerability VCID-k8aa-5wqq-73h3
7
vulnerability VCID-q7b1-n4tc-dffa
8
vulnerability VCID-qh23-73q6-pubf
9
vulnerability VCID-wznk-5ze9-kucq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python@2.4.3-24.el5_3%3Farch=6
References
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=232137
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=232137
1
reference_url http://bugs.python.org/file10825/issue2620-gps02-patch.txt
reference_id
reference_type
scores
url http://bugs.python.org/file10825/issue2620-gps02-patch.txt
2
reference_url http://bugs.python.org/issue2620
reference_id
reference_type
scores
url http://bugs.python.org/issue2620
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3142.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3142.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3142
reference_id
reference_type
scores
0
value 0.01654
scoring_system epss
scoring_elements 0.82102
published_at 2026-04-26T12:55:00Z
1
value 0.01654
scoring_system epss
scoring_elements 0.81964
published_at 2026-04-01T12:55:00Z
2
value 0.01654
scoring_system epss
scoring_elements 0.81975
published_at 2026-04-02T12:55:00Z
3
value 0.01654
scoring_system epss
scoring_elements 0.81998
published_at 2026-04-04T12:55:00Z
4
value 0.01654
scoring_system epss
scoring_elements 0.81994
published_at 2026-04-07T12:55:00Z
5
value 0.01654
scoring_system epss
scoring_elements 0.82021
published_at 2026-04-08T12:55:00Z
6
value 0.01654
scoring_system epss
scoring_elements 0.82029
published_at 2026-04-09T12:55:00Z
7
value 0.01654
scoring_system epss
scoring_elements 0.82048
published_at 2026-04-11T12:55:00Z
8
value 0.01654
scoring_system epss
scoring_elements 0.82038
published_at 2026-04-12T12:55:00Z
9
value 0.01654
scoring_system epss
scoring_elements 0.82031
published_at 2026-04-13T12:55:00Z
10
value 0.01654
scoring_system epss
scoring_elements 0.82066
published_at 2026-04-16T12:55:00Z
11
value 0.01654
scoring_system epss
scoring_elements 0.82067
published_at 2026-04-18T12:55:00Z
12
value 0.01654
scoring_system epss
scoring_elements 0.82068
published_at 2026-04-21T12:55:00Z
13
value 0.01654
scoring_system epss
scoring_elements 0.8209
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3142
7
reference_url http://secunia.com/advisories/31305
reference_id
reference_type
scores
url http://secunia.com/advisories/31305
8
reference_url http://secunia.com/advisories/31332
reference_id
reference_type
scores
url http://secunia.com/advisories/31332
9
reference_url http://secunia.com/advisories/31358
reference_id
reference_type
scores
url http://secunia.com/advisories/31358
10
reference_url http://secunia.com/advisories/31365
reference_id
reference_type
scores
url http://secunia.com/advisories/31365
11
reference_url http://secunia.com/advisories/31473
reference_id
reference_type
scores
url http://secunia.com/advisories/31473
12
reference_url http://secunia.com/advisories/31518
reference_id
reference_type
scores
url http://secunia.com/advisories/31518
13
reference_url http://secunia.com/advisories/31687
reference_id
reference_type
scores
url http://secunia.com/advisories/31687
14
reference_url http://secunia.com/advisories/32793
reference_id
reference_type
scores
url http://secunia.com/advisories/32793
15
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
16
reference_url http://secunia.com/advisories/37471
reference_id
reference_type
scores
url http://secunia.com/advisories/37471
17
reference_url http://security.gentoo.org/glsa/glsa-200807-16.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-16.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44170
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44170
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44173
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44173
20
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11466
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11466
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8422
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8422
23
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
24
reference_url http://wiki.rpath.com/Advisories:rPSA-2008-0243
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2008-0243
25
reference_url http://www.debian.org/security/2008/dsa-1667
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1667
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:163
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:163
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:164
28
reference_url http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900
reference_id
reference_type
scores
url http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900
29
reference_url http://www.securityfocus.com/archive/1/495445/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495445/100/0/threaded
30
reference_url http://www.securityfocus.com/archive/1/507985/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/507985/100/0/threaded
31
reference_url http://www.securityfocus.com/bid/30491
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30491
32
reference_url http://www.ubuntu.com/usn/usn-632-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-632-1
33
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0016.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0016.html
34
reference_url http://www.vupen.com/english/advisories/2008/2288
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2288
35
reference_url http://www.vupen.com/english/advisories/2009/3316
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/3316
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=454990
reference_id 454990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=454990
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3142
reference_id CVE-2008-3142
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3142
44
reference_url https://security.gentoo.org/glsa/200807-16
reference_id GLSA-200807-16
reference_type
scores
url https://security.gentoo.org/glsa/200807-16
45
reference_url https://access.redhat.com/errata/RHSA-2009:1176
reference_id RHSA-2009:1176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1176
46
reference_url https://access.redhat.com/errata/RHSA-2009:1177
reference_id RHSA-2009:1177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1177
47
reference_url https://access.redhat.com/errata/RHSA-2009:1178
reference_id RHSA-2009:1178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1178
48
reference_url https://usn.ubuntu.com/632-1/
reference_id USN-632-1
reference_type
scores
url https://usn.ubuntu.com/632-1/
Weaknesses
0
cwe_id 120
name Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
description The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Exploits
Severity_range_score7.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-g65j-xhje-hkd4