{"url":"http://public2.vulnerablecode.io/api/packages/1037612?format=json","purl":"pkg:deb/debian/util-linux@2.13.1.1-1","type":"deb","namespace":"debian","name":"util-linux","version":"2.13.1.1-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.42-5","latest_non_vulnerable_version":"2.42-5","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85030?format=json","vulnerability_id":"VCID-3dyt-qa2a-rke1","summary":"util-linux: Extended partition loop in MBR partition table leads to DOS","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5011.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5011","reference_id":"","reference_type":"","scores":[{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34152","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34369","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34667","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34624","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/07/11/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/07/11/2"},{"reference_url":"http://www.securityfocus.com/bid/91683","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91683"},{"reference_url":"http://www.securitytracker.com/id/1036272","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036272"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1349741","reference_id":"1349741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1349741"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830802","reference_id":"830802","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830802"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5011","reference_id":"CVE-2016-5011","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2605","reference_id":"RHSA-2016:2605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2605"},{"reference_url":"https://usn.ubuntu.com/5478-1/","reference_id":"USN-5478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5478-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037616?format=json","purl":"pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"}],"aliases":["CVE-2016-5011"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3dyt-qa2a-rke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77137?format=json","vulnerability_id":"VCID-3pq5-w4nm-dkec","summary":"util-linux: CVE-2024-28085: wall: escape sequence injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28085","reference_id":"","reference_type":"","scores":[{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.9315","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.93153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.93154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.93148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.93156","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10933","scoring_system":"epss","scoring_elements":"0.93425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10933","scoring_system":"epss","scoring_elements":"0.9342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.9347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93493","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93488","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/28/1","reference_id":"1","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849","reference_id":"1067849","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/28/2","reference_id":"2","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271942","reference_id":"2271942","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271942"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/28/3","reference_id":"3","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/3"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/03/27/5","reference_id":"5","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/03/27/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/5","reference_id":"5","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/6","reference_id":"6","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/7","reference_id":"7","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/8","reference_id":"8","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/9","reference_id":"9","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/9"},{"reference_url":"https://github.com/skyler-ferrante/CVE-2024-28085","reference_id":"CVE-2024-28085","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://github.com/skyler-ferrante/CVE-2024-28085"},{"reference_url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq","reference_id":"GHSA-xv2h-c6ww-mrjq","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240531-0003/","reference_id":"ntap-20240531-0003","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240531-0003/"},{"reference_url":"https://usn.ubuntu.com/6719-1/","reference_id":"USN-6719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6719-1/"},{"reference_url":"https://usn.ubuntu.com/6719-2/","reference_id":"USN-6719-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6719-2/"},{"reference_url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/","reference_id":"util-linux","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/"},{"reference_url":"https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt","reference_id":"wall_2_27_2024.txt","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995044?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"}],"aliases":["CVE-2024-28085"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3pq5-w4nm-dkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78161?format=json","vulnerability_id":"VCID-61nu-645a-dyhx","summary":"util-linux: arbitrary commands execution via the path parameter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21583.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21583","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11319","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11378","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238716","reference_id":"2238716","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238716"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804","reference_id":"bugreport.cgi?bug=786804","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-07T15:19:58Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804"},{"reference_url":"https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html","reference_id":"hwclock-Privilege-Escalation.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-07T15:19:58Z/"}],"url":"https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037616?format=json","purl":"pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"}],"aliases":["CVE-2020-21583"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-61nu-645a-dyhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49128?format=json","vulnerability_id":"VCID-773t-t959-z3c1","summary":"Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3996","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46093","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb","reference_id":"166e87368ae88bf31112a30e078cceae637f4cdb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/24/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/24/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/30/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/30/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024628","reference_id":"2024628","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024628"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/4"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2021-3996","reference_id":"CVE-2021-3996","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2021-3996"},{"reference_url":"https://security.gentoo.org/glsa/202401-08","reference_id":"GLSA-202401-08","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://security.gentoo.org/glsa/202401-08"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221209-0002/","reference_id":"ntap-20221209-0002","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221209-0002/"},{"reference_url":"http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html","reference_id":"snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"},{"reference_url":"https://usn.ubuntu.com/5279-1/","reference_id":"USN-5279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5279-1/"},{"reference_url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes","reference_id":"v2.37.3-ReleaseNotes","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995044?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"}],"aliases":["CVE-2021-3996"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-773t-t959-z3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49129?format=json","vulnerability_id":"VCID-7ha4-8xxt-xkfy","summary":"Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37600","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12445","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17055","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17009","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16946","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1987320","reference_id":"1987320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1987320"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619","reference_id":"991619","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619"},{"reference_url":"https://security.archlinux.org/AVG-2236","reference_id":"AVG-2236","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2236"},{"reference_url":"https://security.gentoo.org/glsa/202401-08","reference_id":"GLSA-202401-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995044?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"}],"aliases":["CVE-2021-37600"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ha4-8xxt-xkfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49127?format=json","vulnerability_id":"VCID-9czu-jh2d-dbhx","summary":"Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3995","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.41991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42201","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48065","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024631","reference_id":"2024631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024631"},{"reference_url":"https://security.gentoo.org/glsa/202401-08","reference_id":"GLSA-202401-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-08"},{"reference_url":"https://usn.ubuntu.com/5279-1/","reference_id":"USN-5279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995044?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2"}],"aliases":["CVE-2021-3995"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9czu-jh2d-dbhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59297?format=json","vulnerability_id":"VCID-9ec4-db9h-47bu","summary":"Multiple vulnerabilities have been found in util-linux, the worst\n    of which may lead to Denial of Service.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/12"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/16","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/16"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/5"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/15/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/15/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/01/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/01/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1675.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1675","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11182","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11357","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11248","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1675"},{"reference_url":"http://secunia.com/advisories/48114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48114"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66705","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66705"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695916","reference_id":"695916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695916"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1675","reference_id":"CVE-2011-1675","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1675"},{"reference_url":"https://security.gentoo.org/glsa/201405-15","reference_id":"GLSA-201405-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1691","reference_id":"RHSA-2011:1691","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0307","reference_id":"RHSA-2012:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0307"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037614?format=json","purl":"pkg:deb/debian/util-linux@2.20.1-5.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3dyt-qa2a-rke1"},{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-61nu-645a-dyhx"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-a5ny-vcsw-uqh1"},{"vulnerability":"VCID-arhf-bsdt-pbb6"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-etmy-48fm-vudb"},{"vulnerability":"VCID-f2gk-ah7t-huge"},{"vulnerability":"VCID-rnst-1ugv-pufk"},{"vulnerability":"VCID-s9ab-gzsp-wkdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.20.1-5.3"}],"aliases":["CVE-2011-1675"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ec4-db9h-47bu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38976?format=json","vulnerability_id":"VCID-a5ny-vcsw-uqh1","summary":"Multiple vulnerabilities have been found in Shadow, the worst of\n    which might allow privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2616","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18935","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19273","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19227","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19096","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19477","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616"},{"reference_url":"http://www.securitytracker.com/id/1038271","reference_id":"1038271","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://www.securitytracker.com/id/1038271"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418710","reference_id":"1418710","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418710"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943","reference_id":"855943","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943"},{"reference_url":"http://www.securityfocus.com/bid/96404","reference_id":"96404","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://www.securityfocus.com/bid/96404"},{"reference_url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891","reference_id":"dffab154d29a288aa171ff50263ecc8f2e14a891","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891"},{"reference_url":"https://www.debian.org/security/2017/dsa-3793","reference_id":"dsa-3793","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://www.debian.org/security/2017/dsa-3793"},{"reference_url":"https://security.gentoo.org/glsa/201706-02","reference_id":"GLSA-201706-02","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://security.gentoo.org/glsa/201706-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0654","reference_id":"RHSA-2017:0654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0654"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0654.html","reference_id":"RHSA-2017-0654.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0654.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0907","reference_id":"RHSA-2017:0907","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:0907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616","reference_id":"show_bug.cgi?id=CVE-2017-2616","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"},{"reference_url":"https://usn.ubuntu.com/3276-1/","reference_id":"USN-3276-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3276-1/"},{"reference_url":"https://usn.ubuntu.com/3276-3/","reference_id":"USN-3276-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3276-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037616?format=json","purl":"pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"}],"aliases":["(+","CVE-2017-2616","fix)","regression"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ny-vcsw-uqh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85546?format=json","vulnerability_id":"VCID-arhf-bsdt-pbb6","summary":"util-linux: File name collision due to incorrect mkstemp use","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5224.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5224.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5224","reference_id":"","reference_type":"","scores":[{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.8859","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88562","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88574","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88501","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.8854","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256686","reference_id":"1256686","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256686"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/08/24/3","reference_id":"3","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"http://www.openwall.com/lists/oss-security/2015/08/24/3"},{"reference_url":"http://www.securityfocus.com/bid/76467","reference_id":"76467","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"http://www.securityfocus.com/bid/76467"},{"reference_url":"https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9","reference_id":"bde91c85bdc77975155058276f99d2e0f5eab5a9","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037616?format=json","purl":"pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"}],"aliases":["CVE-2015-5224"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-arhf-bsdt-pbb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85316?format=json","vulnerability_id":"VCID-ed2c-q43s-cydc","summary":"util-linux: runuser tty hijack via TIOCSTI ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2779.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2779","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12145","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11913","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12103","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12307","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12042","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12159","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1214","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1312852","reference_id":"1312852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1312852"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922","reference_id":"815922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049840?format=json","purl":"pkg:deb/debian/util-linux@2.33.1-0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.33.1-0.1"}],"aliases":["CVE-2016-2779"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ed2c-q43s-cydc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85534?format=json","vulnerability_id":"VCID-etmy-48fm-vudb","summary":"colcrt: global-buffer-overflow","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5218.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5218","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22902","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23167","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23384","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23246","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23212","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23009","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218"},{"reference_url":"https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8"},{"reference_url":"https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec"},{"reference_url":"https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes","reference_id":"","reference_type":"","scores":[],"url":"https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes"},{"reference_url":"http://www.spinics.net/lists/util-linux-ng/msg11873.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/util-linux-ng/msg11873.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259322","reference_id":"1259322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259322"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798067","reference_id":"798067","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798067"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5218","reference_id":"CVE-2015-5218","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5218"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037616?format=json","purl":"pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"}],"aliases":["CVE-2015-5218"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-etmy-48fm-vudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59300?format=json","vulnerability_id":"VCID-f2gk-ah7t-huge","summary":"Multiple vulnerabilities have been found in util-linux, the worst\n    of which may lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0157.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0157","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18332","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18087","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18182","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18075","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18025","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17818","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697464","reference_id":"697464","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697464"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=892330","reference_id":"892330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=892330"},{"reference_url":"https://security.gentoo.org/glsa/201405-15","reference_id":"GLSA-201405-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0517","reference_id":"RHSA-2013:0517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0517"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037615?format=json","purl":"pkg:deb/debian/util-linux@2.25.2-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3dyt-qa2a-rke1"},{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-61nu-645a-dyhx"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-a5ny-vcsw-uqh1"},{"vulnerability":"VCID-arhf-bsdt-pbb6"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-etmy-48fm-vudb"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.25.2-6"}],"aliases":["CVE-2013-0157"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f2gk-ah7t-huge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59299?format=json","vulnerability_id":"VCID-hhx5-q9sz-eybx","summary":"Multiple vulnerabilities have been found in util-linux, the worst\n    of which may lead to Denial of Service.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/12"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/16","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/16"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/5"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/15/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/15/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/01/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/01/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1677.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1677","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13387","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13535","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13533","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1348","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1677"},{"reference_url":"http://secunia.com/advisories/48114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48114"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66703","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66703"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695924","reference_id":"695924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695924"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1677","reference_id":"CVE-2011-1677","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1677"},{"reference_url":"https://security.gentoo.org/glsa/201405-15","reference_id":"GLSA-201405-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1691","reference_id":"RHSA-2011:1691","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0307","reference_id":"RHSA-2012:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0307"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037614?format=json","purl":"pkg:deb/debian/util-linux@2.20.1-5.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3dyt-qa2a-rke1"},{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-61nu-645a-dyhx"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-a5ny-vcsw-uqh1"},{"vulnerability":"VCID-arhf-bsdt-pbb6"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-etmy-48fm-vudb"},{"vulnerability":"VCID-f2gk-ah7t-huge"},{"vulnerability":"VCID-rnst-1ugv-pufk"},{"vulnerability":"VCID-s9ab-gzsp-wkdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.20.1-5.3"}],"aliases":["CVE-2011-1677"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhx5-q9sz-eybx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88924?format=json","vulnerability_id":"VCID-p35v-d4cm-c7b6","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7108.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7108.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7108","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2354","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23901","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23858","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23709","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23662","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7108"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177331","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7108"},{"reference_url":"http://secunia.com/advisories/25098","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25098"},{"reference_url":"http://secunia.com/advisories/25530","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25530"},{"reference_url":"http://secunia.com/advisories/25692","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25692"},{"reference_url":"http://secunia.com/advisories/25935","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25935"},{"reference_url":"https://issues.rpath.com/browse/RPL-1359","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1359"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-252.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-252.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:111","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:111"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0235.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0235.html"},{"reference_url":"http://www.securityfocus.com/bid/24321","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24321"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618255","reference_id":"1618255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618255"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7108","reference_id":"CVE-2006-7108","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0235","reference_id":"RHSA-2007:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0235"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037613?format=json","purl":"pkg:deb/debian/util-linux@2.17.2-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3dyt-qa2a-rke1"},{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-61nu-645a-dyhx"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-9ec4-db9h-47bu"},{"vulnerability":"VCID-a5ny-vcsw-uqh1"},{"vulnerability":"VCID-arhf-bsdt-pbb6"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-etmy-48fm-vudb"},{"vulnerability":"VCID-f2gk-ah7t-huge"},{"vulnerability":"VCID-hhx5-q9sz-eybx"},{"vulnerability":"VCID-rnst-1ugv-pufk"},{"vulnerability":"VCID-s9ab-gzsp-wkdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.17.2-9"}],"aliases":["CVE-2006-7108"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p35v-d4cm-c7b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60896?format=json","vulnerability_id":"VCID-rnst-1ugv-pufk","summary":"A vulnerability was discovered in util-linux, which could\n    potentially lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7738","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21582","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21522","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2153","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21352","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2135","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21328","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21234","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552641","reference_id":"1552641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552641"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179","reference_id":"892179","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179"},{"reference_url":"https://security.gentoo.org/glsa/201803-02","reference_id":"GLSA-201803-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-02"},{"reference_url":"https://usn.ubuntu.com/4512-1/","reference_id":"USN-4512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037616?format=json","purl":"pkg:deb/debian/util-linux@2.29.2-1%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%252Bdeb9u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049840?format=json","purl":"pkg:deb/debian/util-linux@2.33.1-0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.33.1-0.1"}],"aliases":["CVE-2018-7738"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rnst-1ugv-pufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48445?format=json","vulnerability_id":"VCID-s9ab-gzsp-wkdz","summary":"A vulnerability was discovered in util-linux, which could\n    potentially lead to the execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9114.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9114","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32722","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32221","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98993","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98993"},{"reference_url":"https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/11/26/21","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2014/11/26/21"},{"reference_url":"http://www.securityfocus.com/bid/71327","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://www.securityfocus.com/bid/71327"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168485","reference_id":"1168485","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168485"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771274","reference_id":"771274","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771274"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9114","reference_id":"CVE-2014-9114","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9114"},{"reference_url":"https://security.gentoo.org/glsa/201612-14","reference_id":"GLSA-201612-14","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://security.gentoo.org/glsa/201612-14"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037615?format=json","purl":"pkg:deb/debian/util-linux@2.25.2-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3dyt-qa2a-rke1"},{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-61nu-645a-dyhx"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-a5ny-vcsw-uqh1"},{"vulnerability":"VCID-arhf-bsdt-pbb6"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-etmy-48fm-vudb"},{"vulnerability":"VCID-rnst-1ugv-pufk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.25.2-6"}],"aliases":["CVE-2014-9114"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s9ab-gzsp-wkdz"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88483?format=json","vulnerability_id":"VCID-kj8n-e8vx-xbe8","summary":"util-linux: audit log injection via login","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1926.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1926","reference_id":"","reference_type":"","scores":[{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.8266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.8273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82746","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82765","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1926"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=443925","reference_id":"443925","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=443925"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478135","reference_id":"478135","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0981","reference_id":"RHSA-2009:0981","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0981"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037612?format=json","purl":"pkg:deb/debian/util-linux@2.13.1.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3dyt-qa2a-rke1"},{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-61nu-645a-dyhx"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-9ec4-db9h-47bu"},{"vulnerability":"VCID-a5ny-vcsw-uqh1"},{"vulnerability":"VCID-arhf-bsdt-pbb6"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-etmy-48fm-vudb"},{"vulnerability":"VCID-f2gk-ah7t-huge"},{"vulnerability":"VCID-hhx5-q9sz-eybx"},{"vulnerability":"VCID-p35v-d4cm-c7b6"},{"vulnerability":"VCID-rnst-1ugv-pufk"},{"vulnerability":"VCID-s9ab-gzsp-wkdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.13.1.1-1"}],"aliases":["CVE-2008-1926"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kj8n-e8vx-xbe8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58231?format=json","vulnerability_id":"VCID-rew1-z9tf-wyaj","summary":"The mount and umount programs might allow local attackers to gain root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5191.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5191","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.27005","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.27042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26832","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26862","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26794","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26525","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=320041","reference_id":"320041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=320041"},{"reference_url":"https://security.gentoo.org/glsa/200710-18","reference_id":"GLSA-200710-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0969","reference_id":"RHSA-2007:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0969"},{"reference_url":"https://usn.ubuntu.com/533-1/","reference_id":"USN-533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/533-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037612?format=json","purl":"pkg:deb/debian/util-linux@2.13.1.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3dyt-qa2a-rke1"},{"vulnerability":"VCID-3pq5-w4nm-dkec"},{"vulnerability":"VCID-61nu-645a-dyhx"},{"vulnerability":"VCID-773t-t959-z3c1"},{"vulnerability":"VCID-7ha4-8xxt-xkfy"},{"vulnerability":"VCID-9czu-jh2d-dbhx"},{"vulnerability":"VCID-9ec4-db9h-47bu"},{"vulnerability":"VCID-a5ny-vcsw-uqh1"},{"vulnerability":"VCID-arhf-bsdt-pbb6"},{"vulnerability":"VCID-ed2c-q43s-cydc"},{"vulnerability":"VCID-etmy-48fm-vudb"},{"vulnerability":"VCID-f2gk-ah7t-huge"},{"vulnerability":"VCID-hhx5-q9sz-eybx"},{"vulnerability":"VCID-p35v-d4cm-c7b6"},{"vulnerability":"VCID-rnst-1ugv-pufk"},{"vulnerability":"VCID-s9ab-gzsp-wkdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.13.1.1-1"}],"aliases":["CVE-2007-5191"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rew1-z9tf-wyaj"}],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.13.1.1-1"}