Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jk4d-p93b-53cg
Summarydcraw: Buffer overflow caused by integer-overflow in foveon_load_camf()
Aliases
0
alias CVE-2021-3624
Fixed_packages
0
url pkg:deb/debian/dcraw@9.28-3?distro=trixie
purl pkg:deb/debian/dcraw@9.28-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dcraw@9.28-3%3Fdistro=trixie
1
url pkg:deb/debian/dcraw@9.28-3
purl pkg:deb/debian/dcraw@9.28-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dcraw@9.28-3
2
url pkg:deb/debian/dcraw@9.28-8?distro=trixie
purl pkg:deb/debian/dcraw@9.28-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dcraw@9.28-8%3Fdistro=trixie
Affected_packages
0
url pkg:alpm/archlinux/dcraw@9.28.0-2
purl pkg:alpm/archlinux/dcraw@9.28.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jk4d-p93b-53cg
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/dcraw@9.28.0-2
1
url pkg:deb/debian/dcraw@9.28-2
purl pkg:deb/debian/dcraw@9.28-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jk4d-p93b-53cg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dcraw@9.28-2
2
url pkg:deb/debian/dcraw@9.28-2?distro=trixie
purl pkg:deb/debian/dcraw@9.28-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jk4d-p93b-53cg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dcraw@9.28-2%3Fdistro=trixie
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3624.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3624
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47354
published_at 2026-04-01T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.4742
published_at 2026-04-21T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47477
published_at 2026-04-16T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47469
published_at 2026-04-18T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.47389
published_at 2026-04-02T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47411
published_at 2026-04-04T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.4736
published_at 2026-04-07T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47415
published_at 2026-04-08T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47414
published_at 2026-04-09T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47437
published_at 2026-04-11T12:55:00Z
10
value 0.00241
scoring_system epss
scoring_elements 0.47412
published_at 2026-04-12T12:55:00Z
11
value 0.00241
scoring_system epss
scoring_elements 0.47418
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1968040
reference_id 1968040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1968040
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984761
reference_id 984761
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984761
6
reference_url https://security.archlinux.org/AVG-2111
reference_id AVG-2111
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2111
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
2
cwe_id 787
name Out-of-bounds Write
description The product writes data past the end, or before the beginning, of the intended buffer.
Exploits
Severity_range_score4.0 - 7.8
Exploitability0.5
Weighted_severity7.0
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jk4d-p93b-53cg