Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-cs4a-sme5-7yha
Summary
Multiple vulnerabilities have been found in GNU C Library, the
    worst of which allowing arbitrary code execution and privilege escalation.
Aliases
0
alias CVE-2011-0536
Fixed_packages
0
url pkg:deb/debian/glibc@0?distro=trixie
purl pkg:deb/debian/glibc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie
1
url pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-9nqp-tfvr-ayen
2
vulnerability VCID-jswq-6ru6-wybc
3
vulnerability VCID-kukb-s61t-pbc3
4
vulnerability VCID-nwfb-xnks-1kg7
5
vulnerability VCID-ssnc-wdcf-sfc9
6
vulnerability VCID-tcpv-4crc-zuap
7
vulnerability VCID-us68-psx5-zude
8
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie
2
url pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
purl pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-ssnc-wdcf-sfc9
3
vulnerability VCID-tcpv-4crc-zuap
4
vulnerability VCID-us68-psx5-zude
5
vulnerability VCID-zn6t-3mvb-wufm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie
3
url pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
2
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glibc@2.42-13?distro=trixie
purl pkg:deb/debian/glibc@2.42-13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3e43-r92j-hkd3
1
vulnerability VCID-nwfb-xnks-1kg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie
5
url pkg:deb/debian/glibc@2.42-14?distro=trixie
purl pkg:deb/debian/glibc@2.42-14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-us68-psx5-zude
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie
6
url pkg:deb/debian/glibc@2.42-15?distro=trixie
purl pkg:deb/debian/glibc@2.42-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie
7
url pkg:ebuild/sys-libs/glibc@2.15-r3
purl pkg:ebuild/sys-libs/glibc@2.15-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.15-r3
Affected_packages
0
url pkg:rpm/redhat/glibc@2.5-58.el5_6?arch=2
purl pkg:rpm/redhat/glibc@2.5-58.el5_6?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cs4a-sme5-7yha
1
vulnerability VCID-hu2t-wcga-c3e9
2
vulnerability VCID-vcf1-m7tr-zbgc
3
vulnerability VCID-y19v-br6n-3ybf
4
vulnerability VCID-zcnv-9m6u-yqh3
5
vulnerability VCID-zhzd-f8a6-juaa
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glibc@2.5-58.el5_6%3Farch=2
1
url pkg:rpm/redhat/glibc@2.12-1.7.el6_0?arch=5
purl pkg:rpm/redhat/glibc@2.12-1.7.el6_0?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cs4a-sme5-7yha
1
vulnerability VCID-hu2t-wcga-c3e9
2
vulnerability VCID-y19v-br6n-3ybf
3
vulnerability VCID-zcnv-9m6u-yqh3
4
vulnerability VCID-zhzd-f8a6-juaa
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glibc@2.12-1.7.el6_0%3Farch=5
References
0
reference_url http://lists.debian.org/debian-security-announce/2011/msg00005.html
reference_id
reference_type
scores
url http://lists.debian.org/debian-security-announce/2011/msg00005.html
1
reference_url http://openwall.com/lists/oss-security/2011/02/01/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/01/3
2
reference_url http://openwall.com/lists/oss-security/2011/02/03/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/03/2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0536.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0536.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0536
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51631
published_at 2026-04-18T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.5148
published_at 2026-04-01T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51532
published_at 2026-04-02T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51559
published_at 2026-04-04T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51519
published_at 2026-04-07T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51573
published_at 2026-04-08T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.5157
published_at 2026-04-09T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.5162
published_at 2026-04-11T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51599
published_at 2026-04-12T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51582
published_at 2026-04-13T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51624
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0536
5
reference_url http://secunia.com/advisories/43830
reference_id
reference_type
scores
url http://secunia.com/advisories/43830
6
reference_url http://secunia.com/advisories/43989
reference_id
reference_type
scores
url http://secunia.com/advisories/43989
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://securitytracker.com/id?1025289
reference_id
reference_type
scores
url http://securitytracker.com/id?1025289
9
reference_url https://launchpad.net/bugs/701783
reference_id
reference_type
scores
url https://launchpad.net/bugs/701783
10
reference_url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=96611391ad8823ba58405325d78cefeae5cdf699
reference_id
reference_type
scores
url http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=96611391ad8823ba58405325d78cefeae5cdf699
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13086
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13086
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0412.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0412.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0413.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0413.html
15
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
16
reference_url http://www.ubuntu.com/usn/USN-1009-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1009-2
17
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
18
reference_url http://www.vupen.com/english/advisories/2011/0863
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0863
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=667974
reference_id 667974
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=667974
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0536
reference_id CVE-2011-0536
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0536
24
reference_url https://security.gentoo.org/glsa/201312-01
reference_id GLSA-201312-01
reference_type
scores
url https://security.gentoo.org/glsa/201312-01
25
reference_url https://access.redhat.com/errata/RHSA-2011:0412
reference_id RHSA-2011:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0412
26
reference_url https://access.redhat.com/errata/RHSA-2011:0413
reference_id RHSA-2011:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0413
Weaknesses
0
cwe_id 426
name Untrusted Search Path
description The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Exploits
0
date_added 2010-10-18
description GNU C library dynamic linker - '$ORIGIN' Expansion
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2010-10-18
exploit_type local
platform linux
source_date_updated 2010-10-18
data_source Exploit-DB
source_url
Severity_range_score6.9 - 6.9
Exploitability2.0
Weighted_severity6.2
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-cs4a-sme5-7yha