Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6c2s-4j9m-u7ed
Summary
Aliases
0
alias CVE-2026-35549
Fixed_packages
0
url pkg:deb/debian/mariadb@0?distro=trixie
purl pkg:deb/debian/mariadb@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@0%3Fdistro=trixie
1
url pkg:deb/debian/mariadb@1:10.11.14-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/mariadb@1:10.11.14-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-sawk-emag-1ygs
1
vulnerability VCID-ttzx-uwaj-8uek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.14-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/mariadb@1:11.8.6-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/mariadb@1:11.8.6-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/mariadb@1:11.8.6-1?distro=trixie
purl pkg:deb/debian/mariadb@1:11.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-1%3Fdistro=trixie
4
url pkg:deb/debian/mariadb@1:11.8.6-5?distro=trixie
purl pkg:deb/debian/mariadb@1:11.8.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-5%3Fdistro=trixie
5
url pkg:deb/debian/mariadb@1:11.8.6-6?distro=trixie
purl pkg:deb/debian/mariadb@1:11.8.6-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-6%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35549.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35549.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-35549
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14549
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14587
published_at 2026-04-21T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14626
published_at 2026-04-13T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14516
published_at 2026-04-16T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14522
published_at 2026-04-18T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14357
published_at 2026-04-07T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14441
published_at 2026-04-08T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14758
published_at 2026-04-09T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14718
published_at 2026-04-11T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.1468
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-35549
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2454731
reference_id 2454731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2454731
4
reference_url https://jira.mariadb.org/browse/MDEV-38365
reference_id MDEV-38365
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-03T14:33:50Z/
url https://jira.mariadb.org/browse/MDEV-38365
Weaknesses
0
cwe_id 789
name Memory Allocation with Excessive Size Value
description The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.
1
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Exploits
Severity_range_score6.5 - 6.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6c2s-4j9m-u7ed