Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wuep-98g7-5qeq
Summarysecurity flaw
Aliases
0
alias CVE-2008-3844
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/openssh@3.9p1-10.RHEL4?arch=20
purl pkg:rpm/redhat/openssh@3.9p1-10.RHEL4?arch=20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wuep-98g7-5qeq
1
vulnerability VCID-yrvb-stza-yfdp
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openssh@3.9p1-10.RHEL4%3Farch=20
1
url pkg:rpm/redhat/openssh@3.9p1-11?arch=el4_7
purl pkg:rpm/redhat/openssh@3.9p1-11?arch=el4_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wuep-98g7-5qeq
1
vulnerability VCID-yrvb-stza-yfdp
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openssh@3.9p1-11%3Farch=el4_7
2
url pkg:rpm/redhat/openssh@4.3p2-26.el5_2?arch=1
purl pkg:rpm/redhat/openssh@4.3p2-26.el5_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wuep-98g7-5qeq
1
vulnerability VCID-yrvb-stza-yfdp
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openssh@4.3p2-26.el5_2%3Farch=1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3844.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3844
reference_id
reference_type
scores
0
value 0.02746
scoring_system epss
scoring_elements 0.86024
published_at 2026-04-24T12:55:00Z
1
value 0.02746
scoring_system epss
scoring_elements 0.85927
published_at 2026-04-01T12:55:00Z
2
value 0.02746
scoring_system epss
scoring_elements 0.85938
published_at 2026-04-02T12:55:00Z
3
value 0.02746
scoring_system epss
scoring_elements 0.85955
published_at 2026-04-04T12:55:00Z
4
value 0.02746
scoring_system epss
scoring_elements 0.85954
published_at 2026-04-07T12:55:00Z
5
value 0.02746
scoring_system epss
scoring_elements 0.85972
published_at 2026-04-08T12:55:00Z
6
value 0.02746
scoring_system epss
scoring_elements 0.85982
published_at 2026-04-09T12:55:00Z
7
value 0.02746
scoring_system epss
scoring_elements 0.85997
published_at 2026-04-11T12:55:00Z
8
value 0.02746
scoring_system epss
scoring_elements 0.85995
published_at 2026-04-12T12:55:00Z
9
value 0.02746
scoring_system epss
scoring_elements 0.8599
published_at 2026-04-13T12:55:00Z
10
value 0.02746
scoring_system epss
scoring_elements 0.86009
published_at 2026-04-16T12:55:00Z
11
value 0.02746
scoring_system epss
scoring_elements 0.86013
published_at 2026-04-18T12:55:00Z
12
value 0.02746
scoring_system epss
scoring_elements 0.86004
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3844
2
reference_url http://secunia.com/advisories/31575
reference_id
reference_type
scores
url http://secunia.com/advisories/31575
3
reference_url http://secunia.com/advisories/32241
reference_id
reference_type
scores
url http://secunia.com/advisories/32241
4
reference_url http://securitytracker.com/id?1020730
reference_id
reference_type
scores
url http://securitytracker.com/id?1020730
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44747
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44747
6
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm
7
reference_url http://www.redhat.com/security/data/openssh-blacklist.html
reference_id
reference_type
scores
url http://www.redhat.com/security/data/openssh-blacklist.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0855.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0855.html
9
reference_url http://www.securityfocus.com/bid/30794
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30794
10
reference_url http://www.vupen.com/english/advisories/2008/2821
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2821
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618333
reference_id 1618333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618333
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:as:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:as:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:as:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:es:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:es:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:es:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3844
reference_id CVE-2008-3844
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3844
19
reference_url https://access.redhat.com/errata/RHSA-2008:0855
reference_id RHSA-2008:0855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0855
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score9.3 - 9.3
Exploitability0.5
Weighted_severity8.4
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wuep-98g7-5qeq